RLBA-2019:3337 perl:5.24 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl perl-5.24.4-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm bc2b8351bbdcfc18aaa94b1e10e09d16071ec9cd09061fb6c72a86d215c29ed0 perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.30-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 284a79810b19a9cc9c3baf11a16a9d6bcf6c8e4d1f13f9384480488f2f718d37 perl-Archive-Zip-1.59-5.module+el8.6.0+882+2fa1e48f.noarch.rpm e20635f433b25577eacbeb27f98f0ac28fef90437eebbd960658d4a24088c516 perl-Attribute-Handlers-0.99-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 0636a55550eddff58de3540236644796ab56a39f5fcf67d4a91cd0dcb394fbae perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33 perl-B-Debug-1.24-3.module+el8.6.0+882+2fa1e48f.noarch.rpm bd8f4c31ca0f3cabadc5a2e24587956f1ab00aa76333ea37e66a416a9f6d4166 perl-bignum-0.49-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 9190d287b3e7aaa44eb4e779e2bc19a5ecf96f1864d0c9b279c7d8a7c4812357 perl-Carp-1.40-367.module+el8.6.0+882+2fa1e48f.noarch.rpm dccd9a98c08525485362d24c2486a8ac01dad4b452b16c3324a0d917e71520e7 perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.aarch64.rpm 9b6e0826474dc14c0afd9dc4275d66757c1e22c0a66e1442930c2b21536b7fb7 perl-Compress-Raw-Bzip2-2.074-2.module+el8.6.0+882+2fa1e48f.aarch64.rpm 7142c1fa8998c69f01d1f98c052c3fabfca6dd6e7ed65b842710108cfe89edb7 perl-Compress-Raw-Zlib-2.074-2.module+el8.6.0+882+2fa1e48f.aarch64.rpm 6fc8e956bacb95866c43adf285f7efb65a15649d71cb2f021ec816e8b439040a perl-Config-Perl-V-0.27-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 41f99ce395d4284c7a06f40922d1de971503c243b2f5d018837d443fcb60e4f5 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-core-5.24.4-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm aeab2b5db0554ba92a8c6613e14d1d6ecb94bff95c344469a20e52f54c5d6f93 perl-CPAN-2.16-2.module+el8.6.0+882+2fa1e48f.noarch.rpm a96fde87471eb57269591b9b8fd112e7d9978f96d52713de169b37dfc0c2dc9c perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.161-5.module+el8.6.0+882+2fa1e48f.aarch64.rpm 92a38a517f8b439c501d4962e279d4ded97404605d2718a28d6c89073f345bc9 perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200006-9.module+el8.6.0+882+2fa1e48f.noarch.rpm 1bb421e4908d5f52b6f38dea6809d38f1ac8057128d9fc21fe11188451298ac4 perl-DB_File-1.842-2.module+el8.6.0+882+2fa1e48f.aarch64.rpm e719a40d1f118601b97a5de0b99010b4a23a06309cc25b1fb29e56cbf311c4c5 perl-devel-5.24.4-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm b4cdd23e57d95dbb2f308c8b3aa2722ab749281d63fcd3dc2ff47d21fc65939f perl-Devel-Peek-1.23-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm e9e0a015121bc7c3a6ca458f83e37a5a1754011809c1511cdff8ee84937f72e4 perl-Devel-PPPort-3.36-6.module+el8.6.0+882+2fa1e48f.aarch64.rpm 434809d18e9c956d4eaca6c2083b2b56977b176d3ac1483f12d1e66fef35c984 perl-Devel-SelfStubber-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm ef98672b390a5ed26def8de37e81a543eb214ea09770ae98379db5af70b8bc17 perl-Devel-Size-0.81-3.module+el8.6.0+882+2fa1e48f.aarch64.rpm 2b060995fd4d7692cada97d7b9c2c4278751a00ac6c9c8d5b4fa9154765fe59c perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527 perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.aarch64.rpm f2a4d752e8722c823852270abcb64e9197c085cb1667885d3116b6feb0e8422e perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.aarch64.rpm b428259f726200b5e030e3931252b58379e0d8a7225d5d3a5cad3f7f7864fc4c perl-Encode-2.88-7.module+el8.6.0+882+2fa1e48f.aarch64.rpm afc1e8fe19f5f58df18b090f7cf40fc2f9c78995fbc0d89a51824cc951744bb2 perl-Encode-devel-2.88-7.module+el8.6.0+882+2fa1e48f.aarch64.rpm e4aaeed2e82b3d3d3e5d9f929eab52bf2b4876584a0c9b02019ec0e7fb07ddc4 perl-encoding-2.19-7.module+el8.6.0+882+2fa1e48f.aarch64.rpm 5657a84f582c1ca1fe1a16fffc775fb8f9e9e1907e48a920f453ab6f008bf6b1 perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-Errno-1.25-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm 5d044d4ac9d8f82413664f44fd0db4f7f44f439e6a48cc371d21f49b8cb95107 perl-experimental-0.019-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 9057e0261573517c85781348b4d2cb8d3a1522980ef1548506d1259993728a26 perl-Exporter-5.72-1001.module+el8.6.0+882+2fa1e48f.noarch.rpm 640f84061e21c1881be61afc0264b2d9f9681d317f58c8a82d33bb0f26e32e9c perl-ExtUtils-CBuilder-0.280225-367.module+el8.6.0+882+2fa1e48f.noarch.rpm df0fddc4918eade6922c99d172232f0a89556eaccfdff8bed0b1247b380861fc perl-ExtUtils-Command-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 6bcde0c83687dba9c5731ed9addb899d2b102e20c7a48bc0e74db44255064657 perl-ExtUtils-Embed-1.33-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 8ca65427b1b0ef2e3c4ba78a8c62b5ca0256a5732b681e498fff04313ff4ac5d perl-ExtUtils-Install-2.04-368.module+el8.6.0+882+2fa1e48f.noarch.rpm b5be07c68ab2d7222f93cb1b4b153e8735c0c7fab052cc58ef40d9fd5834d30b perl-ExtUtils-MakeMaker-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm d1439b57adf1a41553d1c4818116fedd7cdb8026caf683ee03dd1bdea0a05a1e perl-ExtUtils-Manifest-1.70-396.module+el8.6.0+882+2fa1e48f.noarch.rpm b3b1da48caf33d90c0c386b8dec4848ef8419ea7b78e30c1a4910f16c2ce24c7 perl-ExtUtils-Miniperl-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 17ad27e28b05f97412df3db417462ad1319ed74cbc0d5b00542e8b35b3a55695 perl-ExtUtils-MM-Utils-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 4a1b1652fe395144d4a6e8879c1b314d7e82a02dadc76367d09501be5a82c386 perl-ExtUtils-ParseXS-3.31-369.module+el8.6.0+882+2fa1e48f.noarch.rpm 514e9ba445971d6e061774f14c67ffe43e36099ece3c6619277a2322ff61e6db perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4 perl-File-HomeDir-1.00-14.module+el8.6.0+882+2fa1e48f.noarch.rpm fda4476417d93399ec4af2afeec4e9b1fc145b913a01e63e0f2b350e6050cfbe perl-File-Path-2.12-368.module+el8.6.0+882+2fa1e48f.noarch.rpm 8dfe4ca93128cc7e0bdee3bb4d617db8be88ad57ec68a8465e8cd952722b4cd0 perl-File-Temp-0.230.600-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 00e4e7af6fa79719621397585031e86ec8b6732b2ee66ef694661dd9fb6617f2 perl-File-Which-1.21-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 359a13c2dd09d047216f4221342f03bc931b794ae10ef9fa2f581cdbec9d78af perl-Filter-1.58-3.module+el8.6.0+882+2fa1e48f.aarch64.rpm 8e65a2380302b5f9cc5963b2a185d7a82d3a01a6ce7548391f850ac8a3aee1e2 perl-Filter-Simple-0.92-367.module+el8.6.0+882+2fa1e48f.noarch.rpm 043d08f0ba63f36d37e824045f8d1527543539afcfdd3e76715d4f8692489afc perl-generators-1.10-10.module+el8.6.0+882+2fa1e48f.noarch.rpm 53ab16cc2a6044d1b17e0c0ecdf61a32fb5a55ac4e0c8a33999300a9af3a81ee perl-Getopt-Long-2.49.1-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 9b2d450c22271b97710023e5bd6799362b2071600ae3421139aa954315778900 perl-homedir-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 20c3934967025b7449d03f473c126be299bf344a3cb7a89d13e3bc5ba5807ef9 perl-HTTP-Tiny-0.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 26124777a662b13fb7b1bd2c12a0b47af496171934fa72c4e56ecd0f5418196a perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-interpreter-5.24.4-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm 8ac16e17d034b36b7a56cec351d96f292d6159184d6e137882af4c8f26a823ab perl-IO-1.36-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm 86322ed5b8a826e9e1d744295551ad79d4660c3a79ad60eb2111ff73493113cf perl-IO-Compress-2.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 553ca203f0ff324bc6e32a382669d210fbe6f05151a6fa40b6b5344196675152 perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm 1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d perl-IO-Zlib-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 85bbbcab465bd31e491cd9a0fb205ca696fb58569eb78a5319afd1b4745a6a71 perl-IPC-Cmd-0.98-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 14a99731e6faca7f2a4e3771d7968bf2646b349fc4c45788217610b9e2308683 perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm 0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.aarch64.rpm 3ff991466a1c9f2f64f1164c1d4c4fe5e5f7f2966c49d3ba393f00de8ac55496 perl-JSON-PP-2.94000-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 0ab2463181d845a62f04b6985721910f312723fef221e029224182e0478c19c6 perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e perl-libnetcfg-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 347323fb832698830bcbf389d3e9cbf86ea251b2430cce64bf418b28a9f45cf4 perl-libs-5.24.4-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm 37fa81d84ff6a42f4d574c9c6b1384e26c267c41db9e61eb50e155f95eddf033 perl-Locale-Codes-3.42-3.module+el8.6.0+882+2fa1e48f.noarch.rpm 3674177ef43bc31a15199981f415d0a64eba50134b84af2bd7835cae3e662975 perl-Locale-Maketext-1.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm 0bdd201a2fcb9b4df608cd0e0d02d32868f4b8ed373b306f0fe62031713a0f6a perl-Locale-Maketext-Simple-0.21-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 464ed59f395cff9befc5bb71a535266942390fab93beea98df2678bc6ae40969 perl-local-lib-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm ee01c2a5964360d8c3efae128ea244e7eebeb8809b7a091608e55f9d001ebbaf perl-macros-5.24.4-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm 6d684290fcd9e8dd2750915c2d32ef770116d2e729a0afb35df5b53824b62814 perl-Math-BigInt-1.9998.11-6.module+el8.6.0+882+2fa1e48f.noarch.rpm 5928a5b278077fd041d2ee403e2c796d7f0b6c0719d75db15a648bdf76a577ce perl-Math-BigInt-FastCalc-0.500.600-7.module+el8.6.0+882+2fa1e48f.aarch64.rpm b903b2f6b5b6035f74c48391d24f69aa0d03c4bdb97c392a4bee334f36522ab8 perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-Math-Complex-1.59-404.module+el8.6.0+882+2fa1e48f.noarch.rpm e72c5badcef6a51d7769b2cb353ac86496cf77a3a37e30f65c576708a5ef6745 perl-Memoize-1.03-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 8ddaeeb2d7a2aecb961c6eefa7bc45ee75e2c2dcb4f599ee9044b77c4469eb7a perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.aarch64.rpm da2edcc116f5d66f6eb2dc23819a8e0f51e330373560ec0545871b3ff0bf4c96 perl-Module-Build-0.42.24-6.module+el8.6.0+882+2fa1e48f.noarch.rpm 0fc01d5f4ede438c698eddaac008f01a9983aa39e8eb585511a312e1a9c44d47 perl-Module-CoreList-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 3f2b62b4468b39ef7c1cf12d611d7dca112376fdd6130a5db6ac7d1476f0b73e perl-Module-CoreList-tools-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpm df905b45a1a24edb447c3ff41b22ab73d708ac22128e1629df328ac3e60b4427 perl-Module-Load-0.32-396.module+el8.6.0+882+2fa1e48f.noarch.rpm eae9feee13e8b09cc4bec0529baeb08651b1c0707d974dd9aa9c3c8f4a119301 perl-Module-Load-Conditional-0.68-396.module+el8.6.0+882+2fa1e48f.noarch.rpm 0bc3a979cc4c3892dbbd4373caeba39b6ea3e12a3734118fb20bc1751a25d89b perl-Module-Loaded-0.08-404.module+el8.6.0+882+2fa1e48f.noarch.rpm df6478817929681dcf95beaa9bd2da1d6b35dc9728cb24085a96aa1dba10368d perl-Module-Metadata-1.000033-396.module+el8.6.0+882+2fa1e48f.noarch.rpm 1d53b887d0f64d9bcf8a541c76876100b0886ced233535ac9aea4664cafeafe5 perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-Net-Ping-2.43-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 48c19749f3d1a19180378962e2883b4e40f0baf2d2e1ce3ae19c682d0e461952 perl-open-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 7e66f3227759c812a979237952494ca14ff148b8afc2e64a86f6ae404849c6b7 perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.aarch64.rpm 2a28f679f001909cc3710b117c3b8b8329824ebdcca201e1bc46bf35d2ed79fe perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm 030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe perl-PathTools-3.63-368.module+el8.6.0+882+2fa1e48f.aarch64.rpm e307eb1aed6c9a43d04a56247e84f39661bd206dd448105204532d1f53a17351 perl-perlfaq-5.20180605-2.module+el8.6.0+882+2fa1e48f.noarch.rpm e8764f56dcd784fca14835ab33e6056f2b4a4c92ef4d7ad9f6e2b7c25c39bd5d perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm 9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-Pod-Html-1.22.01-404.module+el8.6.0+882+2fa1e48f.noarch.rpm e4050c1f33ea491db07baf1974013c96be37dc5efaa9a6be23340da0a51cf5e2 perl-podlators-4.09-4.module+el8.6.0+882+2fa1e48f.noarch.rpm 29b22dc38352b948d730769d4bc38c15d4d1a8d4d969c3c2c4e0c6209399c440 perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Perldoc-3.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm bdac88f236f4f4db3eb4c8e71ebdd29d572378b20cbfd077802e86630b657516 perl-Pod-Simple-3.35-396.module+el8.6.0+882+2fa1e48f.noarch.rpm 2488759ef34438ee82b327f160c9539f94aa10cdc19ed411622d4fa9f72beaf2 perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm 8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917 perl-Scalar-List-Utils-1.48-2.module+el8.6.0+882+2fa1e48f.aarch64.rpm b97ffb7ef3ce83bc513b98b45eb91f2efc54544f83e10aae419d8828b041585a perl-SelfLoader-1.23-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 263e65e005eff2a90f456fbe0989a44f48b7cfb8c27fcad1f38a18f3f9b9a825 perl-Socket-2.027-4.module+el8.6.0+882+2fa1e48f.aarch64.rpm 485fd1e629293d924cc3d210e1756b68e589fe9123e96ed81c33ab258c34fd62 perl-Software-License-0.103012-5.module+el8.6.0+882+2fa1e48f.noarch.rpm a4de15d34e598d0d3f877c4396134528358d8d044d1786d5ef9cd5997f45478b perl-Storable-2.56-369.module+el8.6.0+882+2fa1e48f.aarch64.rpm c04e212c94be4a241bb759631f4a0b3406a4a2abd4874b21c3cb6813bfd8c9b1 perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm 75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-Sys-Syslog-0.35-398.module+el8.6.0+882+2fa1e48f.aarch64.rpm 49ade46e68b59d8df395896ebecfbbd1ace02b71d1eccd09e1e12031541d5190 perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm 94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Test-1.28-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 053d533f0d4a2dcc82a0675168afcdef3de0c819236c0127015c185bc2945da6 perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-tests-5.24.4-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm a505782d337661e4ddbf4980908c5b9ff9ce2131df15559177b7a2eec6829033 perl-Test-Simple-1.302086-2.module+el8.6.0+882+2fa1e48f.noarch.rpm a5b3a0a2ec4099e806960de4795d19e6a75f7323ba8ca18dfc7e90738c7c2fc4 perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce perl-Text-Diff-1.44-4.module+el8.6.0+882+2fa1e48f.noarch.rpm ca1bf7d5197ada4c75b68880287b665215f1f02b28bbed2dc6b56096abd5e131 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.47-2.module+el8.6.0+882+2fa1e48f.noarch.rpm 33c43f91218da0bab13f9d42ac8d4b047a9a37e430c0060ad40e798a23e1a0de perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e perl-threads-2.21-3.module+el8.6.0+882+2fa1e48f.aarch64.rpm 6b7f7d5ca2a61c8aea63681c653ed73e2cf9a2ababd3ccc13266ba567f8e9e2c perl-threads-shared-1.58-3.module+el8.6.0+882+2fa1e48f.aarch64.rpm 9050eac6c286e267fa97060c140ea52f371250464833a920e90e795230f7b7b5 perl-Time-HiRes-1.9753-2.module+el8.6.0+882+2fa1e48f.aarch64.rpm 354efaec1ae183f15bb567270ac701db92eeba315ffaa3ac2bc72db73bfb0c03 perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4 perl-Time-Piece-1.31-404.module+el8.6.0+882+2fa1e48f.aarch64.rpm 0a9115a50ba055e68cba692d12b8eff847402cc081b009a55c94bacb27df61c5 perl-Unicode-Collate-1.20-2.module+el8.6.0+882+2fa1e48f.aarch64.rpm 8fbbefee728f14f5976c857ab58ee9e86186eb047a9e67c6d74115aec8e7f1b0 perl-Unicode-Normalize-1.25-1001.module+el8.6.0+882+2fa1e48f.aarch64.rpm 5be78aaa82bfc57322eb9d9137866de33753b1d447e2c1c356a2a08fefa54fbb perl-URI-1.71-7.module+el8.6.0+882+2fa1e48f.noarch.rpm 1929e6de9956a54147a75c3101490f580e7b998c2bb12e15338346aa8d64af12 perl-utils-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpm 8971fb7943ab5fde05ecd601620877b37be8fdd306fed43ca1957206564845c0 perl-version-0.99.24-2.module+el8.6.0+882+2fa1e48f.aarch64.rpm ef9b16fda222334c2f480fe2ab0e7210ec3650d3b9d9e4de50dfcd060fa99fa9 rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLBA-2019:3522 perl-DBD-SQLite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-SQLite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 RLSA-2019:3553 Low: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gdk-pixbuf2-devel-2.36.12-5.el8.aarch64.rpm 01d472bb139e191bc37af74e008b65edbe710f148a95baba813704e35036996d gdk-pixbuf2-modules-2.36.12-5.el8.aarch64.rpm 2979b619032a1f9c7ac0419710ebc893a37bd3df9569571996207952d3c31602 libpurple-2.13.0-5.el8.aarch64.rpm 124438f347c07aacd53a86ed85b77cc757f1434b3e1be0eb120228565c899b89 RLBA-2019:3621 libidn2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libidn2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms idn2-2.2.0-1.el8.aarch64.rpm 90504e519d0aab829db329bcdc23d26bfbe79060fb4eea0866aed60056ddab0e libidn2-devel-2.2.0-1.el8.aarch64.rpm 26ce0b2d7a3ed88a011da1022a8f9ed6f07490cbb9df711934a4b43b9b7924f8 RLBA-2019:3634 blktrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms iowatcher-1.2.0-10.el8.aarch64.rpm 8ad3fc4b8de1804ff585b6a14a21dea7f9aeee2999ef1bf450f267980677c2c5 RLBA-2019:3667 mtr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mtr-gtk-0.92-3.el8.aarch64.rpm 428c1552e1a03dbef34e4c427fd31b2675ce9bddf04cc7743848b8c4498dd24e RLBA-2020:1759 newt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for newt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms newt-devel-0.52.20-11.el8.aarch64.rpm fbcad4f8f4378bb7a13a2f2eea14de8c9b37df4010d2355f18ebdd2b9f274f20 python3-newt-0.52.20-11.el8.aarch64.rpm 6f719ef8c3e5645b06f5c15fff0ffefc84e6eb797e36613afa8323d05719e955 RLSA-2020:1766 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms baobab-3.28.0-4.el8.aarch64.rpm fd90ce8d9f0e38a1ed0e0af5201c374d4bb74ce54412adfe5209e8929e6c88d7 clutter-1.26.2-8.el8.aarch64.rpm cf901d1a9a3c631c75111268af03f80583f429d88b8a650ca6bc137aa3b891be gnome-menus-3.13.3-11.el8.aarch64.rpm 2acf81a7b4dfc0ab32b6875128c77f764ee711a6f6cff3ccf0e26a6f7b0bc1c8 gnome-tweaks-3.28.1-7.el8.noarch.rpm 71a35489c56519f5a85f06df899d7690c42006e1d2263ae5f7d07cff106600e7 RLSA-2020:4436 Low: gnome-software and fwupd security, bug fix, and enhancement update The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for appstream-data, libxmlb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms appstream-data-8-20200724.el8.noarch.rpm 2c9a720f54ff898448f86098e789fbb45759d5eef43a9f5550e27ce194baeca0 RLSA-2020:4451 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms frei0r-plugins-1.6.1-7.el8.aarch64.rpm bf994db33d689889489bd1572686bc30356954d451c6349f9c4cf6231694b7dd frei0r-plugins-opencv-1.6.1-7.el8.aarch64.rpm c8ba4efe3f728e87aaeaac96b0b6e70d390337dd4fc2048fd54c311e1c23c2ed gnome-remote-desktop-0.1.8-3.el8.aarch64.rpm bcf5070c71d09c07c8568e33f0f76d40c03bed1738a8d0e8b09b81d27cf95743 libsoup-devel-2.62.3-2.el8.aarch64.rpm 0eceacc78787037c8e5233d78861146902cffca48bebb2414ffb0149791f141c pipewire0.2-devel-0.2.7-6.el8.aarch64.rpm 38ff2ea9c0aeb38ed2b4ad939cbc720a816c0f2de43baf914359d1f6e23abef7 pipewire0.2-libs-0.2.7-6.el8.aarch64.rpm 84c274bb5239d387ce0bb48abed2dee5fc99ee0258b3df8b4483e027bb5a87b7 pipewire-0.3.6-1.el8.aarch64.rpm 829d0ce97ad370f27abb9697d1dfdbf1f3c1dd8720bf54a402bca9baba6ee554 pipewire-devel-0.3.6-1.el8.aarch64.rpm b0235cab26fbbbcfadaae44fbfe21c7853bd2db338c814526cf36935f8d2ad56 pipewire-doc-0.3.6-1.el8.aarch64.rpm fcc20daf5163cfc3689077577142b892bc7a3d4111bd0b87d95ec339c6190e0c pipewire-libs-0.3.6-1.el8.aarch64.rpm 7ecf5aa6ba46b24b20022ef387f97cff6b3d3248edbeb9658fda3c6afbd9ede4 pipewire-utils-0.3.6-1.el8.aarch64.rpm 8328835bc35f7aad2ab06f3c382934eb90e25c8d80ea4d664eb80fad4eadd14d potrace-1.15-3.el8.aarch64.rpm bfef3b150242afedfe7bc2469df6ac2ed6dd0e57a199ab48199ea27be5ecc201 python3-gobject-3.28.3-2.el8.aarch64.rpm 0532c507858b74b841545d12ad6848345d342c4be8ae326ce6027616a19f25da tracker-2.1.5-2.el8.aarch64.rpm 076d3fe7e3dd13b6989830817a6669585ea5b99f7895da99c916986eb36e7d4c vte291-0.52.4-2.el8.aarch64.rpm 5b853604a8e9ce59d8b6cfea5376019ac15015186b97157bad9c86dd1523ec90 vte-profile-0.52.4-2.el8.aarch64.rpm 37c17af775b3a5ef88043f19c3c0dcb25928891d23200d1f6d7584edccd9dedc PackageKit-1.1.12-6.el8.0.2.aarch64.rpm 2299aabcd7548fcf11f8a77727eafc883f3b2f4054bd519185fd1ab47fd34897 PackageKit-command-not-found-1.1.12-6.el8.0.2.aarch64.rpm 0c275dbb44a4aac13b3c385a50917822914718c44c9a9a8e85d6ded2b59ec72e PackageKit-cron-1.1.12-6.el8.0.2.aarch64.rpm c95459d738c4f274317ac42e89b1df89ea31b9e9e521f6f5d10b32fd6b1c5b9a PackageKit-glib-1.1.12-6.el8.0.2.aarch64.rpm a038eec6d1907efad75c75c7ab6b04d4453b6b3876ef6ac709f280b3ac64e2d6 PackageKit-gstreamer-plugin-1.1.12-6.el8.0.2.aarch64.rpm 95f47cb0782207b2383c9cad51bf93b9680ccbf763621542071cb0a2f447dbbb PackageKit-gtk3-module-1.1.12-6.el8.0.2.aarch64.rpm 8591fbc0307d80b21503de872bdb72243fd555bd71de96385c7c6c0d7fb97c43 RLBA-2020:4557 zstd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zstd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms zstd-1.4.4-1.el8.aarch64.rpm cea4e6e939f8a14fd08d40de28203103964559a5358de4c11771d138f54793d3 RLEA-2020:4727 new module: perl:5.30 This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm 4ae5d31a58e084256d22b67d1c4a35c947fb7829b40bea49b2ca54e21bda4908 perl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm 3b4eaea2d1eaf8d161f48a771f08fac793d30846ad09b36883cce5952ff3ad2a perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33 perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm 9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890 perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.aarch64.rpm 9b6e0826474dc14c0afd9dc4275d66757c1e22c0a66e1442930c2b21536b7fb7 perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 76298425c5c0c047d0cfa2c157e3bb885837e4af76dc8dd8ad17ca4cb8d2bab1 perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 2ec26f5a7b38817bcccbe848c3cc7d18d4335dec1c4a5bf244f5251d51bfb9b7 perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm 8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm a3447e3b3260b007272f8c84ef84acb17cb71d37b7880d1ef6357951ac562315 perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.aarch64.rpm afdb8a6a46014b6875ae047cb29ad08d994aa0e68d0c349ade129346904f5b0d perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm 73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02 perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.aarch64.rpm 872985529d606ce7520400ee24e6d0640224fb208d30d9a7de3e7e516f720923 perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 9cbb5ddbe0f9616f99592c07a804706c73ae714f0a1042e25ad47e3b2437e392 perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.aarch64.rpm 41b678e29dfe0a2f79a0148857d3e76c4bef58b7960fcede4f5ffb95448d9f37 perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527 perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.aarch64.rpm f2a4d752e8722c823852270abcb64e9197c085cb1667885d3116b6feb0e8422e perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.aarch64.rpm b428259f726200b5e030e3931252b58379e0d8a7225d5d3a5cad3f7f7864fc4c perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 140e1e284cfcd47e53a4e41a951f7bbd2537c9c88fbb6b722957e3593dce6932 perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 0a781191198dee85d26d84cd7af778e1a36698ca1700754e3122420a68594f1f perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 7febbfbd109ef0718f64b2df303fec4f2eda17a4f14febc7d5ad55ed478599c9 perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm 4e8daf0287ea71e64fdb9e6391f257d9ea6c23547d5894df74a595b3ff610199 perl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm 65b9ba1b7e84507cc648a422475283e27ed53de4097f1ff2121b9f9ff3d97c7e perl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm 043ff366aad10957c32292d322c3458202d739c703261b8cbfd14f58bb5da151 perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm f636b21815be2e444fa5b42e99e4328c024327af776bffaebd9d33825d346be7 perl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm 857b4014bddf434d5e21745f92b52a4f046f666cbbdeade6c4043a1b8796e40c perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm 398bd10b093a537a73d3d0df58d4581b21c67d612279a37b22fd614d23adea17 perl-ExtUtils-Manifest-1.72-438.module+el8.6.0+878+f93dfff7.noarch.rpm 4d1776ec7edef8aa7ef06b53a9ccfe28eb78d28dbac1fcdc0f9826591cff9ba6 perl-ExtUtils-MM-Utils-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm cca7d27dbc8d3bb0f080aecd8c1f15e5164a9d9087bac91fffb21753ea601f17 perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4 perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm 995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11 perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c perl-File-Temp-0.230.900-439.module+el8.6.0+878+f93dfff7.noarch.rpm 67bff95e50d168699ea7a9ea2ec030daabd312f2aaa5d945ac34f92266216242 perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm 5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.aarch64.rpm 3908a29229cd2b6b4c05b7d2321d0f8b801ed4cc3a28bf767215bb8037fd6b5f perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm 1ff0c6c297133b9629712d61b0751dab739548a09a9ed1a014f89b19e210942c perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm 37fcc7a1a0384d0d2fed35aa935e2249dc65641c6ed36cfbaffb844dce6ea14a perl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpm 78bd8b6bb85141daa4c8a4ed9f292276d00dc3d79511de14a028deda013b6f89 perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853 perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpm 0ee7a2f08d700939b9878147d4a711c27fff146c037bdddd7f4375dfbe632c5d perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm 46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpm e1b32c483db01fa644aa11da6316c65ae15c52cdc683702f2724e1bd74c36fc6 perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm 1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm 24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36 perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm 0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.aarch64.rpm 3ff991466a1c9f2f64f1164c1d4c4fe5e5f7f2966c49d3ba393f00de8ac55496 perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1 perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8 perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.aarch64.rpm b2738ffe053d7a125fbe0294af2ce7b9e2c0a9ef972822671a4e1689228f109c perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.aarch64.rpm da2edcc116f5d66f6eb2dc23819a8e0f51e330373560ec0545871b3ff0bf4c96 perl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpm df5dd4eb3e9897dba7b9d45123b567b21f33f83fe70141c3ed2fa6132d619c82 perl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm 20d8397c0ab7ad88baf463277dd8fc673e094ea05a4adda02fa0f692ff6374c1 perl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm cc8295684213d6c1f1b9bd7f25a88b9621fce85560e9a719a32121cb3b762361 perl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpm ad836cedbb118144fbb29c1adacf8745b0be196bed0e7c20a7918df0c7632327 perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm 1d281d8bb79c2f3a7f8e8245faeac9d5381e450515d7e510b4bbf8f9313205e0 perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm 23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79 perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 2107d6fe2bd4c30f879d05e9e91f3a67b669e9311a7d821bc1eaedc69362ac0e perl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 4e7d56c452587e7eda8a6d95f035df77838d724beb89d8300f489bf05c4119c6 perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.aarch64.rpm 2a28f679f001909cc3710b117c3b8b8329824ebdcca201e1bc46bf35d2ed79fe perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm 030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.aarch64.rpm f1c7d8bfb0ca6183c86877ddd7b371e7a67a127e34ba374d0700df2571783514 perl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpm 68d69421e6ecdd0c17b838ce5cd87e6178e480b859e741d75790a38e001a0e3a perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm 9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpm f97ad11912e5d33ff4ecd9080ca24d427fbf5d44165f53d663e0affa77f2b01c perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpm 35d8c093f5f2aacfab1e753a4c0c2bcf2736885654ccd881b194eccb8a3490d9 perl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpm 684f8c4f2fad53955dc42f7e46620c817d77f6ada02b3585ed01890bc86ac7e0 perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm 8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917 perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 5da3d1b9750d3e8de649609447be131a84af4b4c68a07394b0c670b6f87f1453 perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.aarch64.rpm bbab83bb54090b30e865aea443471fb914293bc5615c81faf05d1dd2209a1057 perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4 perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.aarch64.rpm e605279c6c89893268d830ebf4d7349e3ed3226101a80960ae52108487e977d2 perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm 75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 8c376cd4f3a4a128ba9059b381585fd81b1e52a4d493dedb8aff24ebc643ac0d perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm 94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm 77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533 perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpm fa90202ab3e84856ac931df1ec5dfe31e4854dae428d3dc1a888e17baeccb30b perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm 0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 0120b2363c0ab5ff1de28ac18730189834c2ab24da15634a496a808c67f9e8f2 perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.aarch64.rpm 04f631e33dde3aa3225758169fb10f2df5052575b0cf521c6d39e7c6e130986e perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.aarch64.rpm b33d000b05945eb6a68c9c1eded2089eb0542bca9604d7d8f71d796e6e810393 perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4 perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.aarch64.rpm a855fe39c39b4c5b56f428835db080bae31a450f9a48f9ff7032ca16a15a6942 perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.aarch64.rpm df9c42e186df9424f991acebaa9a644aba1c559f190147d9806eaece5e56c918 perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm 6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0 perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.aarch64.rpm ebfdfab5ef3882130cb3cfacd301a5ba4f4fd3c19b9f92166dcb4969f071001b rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2020:4767 perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2020:4802 perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLSA-2021:1586 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms atkmm-2.24.2-7.el8.aarch64.rpm eb76296bd4abc754e40dab69dd74ae90be6f1740a307728d6c8399c636a4d86d cairomm-1.12.0-8.el8.aarch64.rpm b5ba50b99a52caee0456fdd0a2a70740e15c2fd6bbdaa169ec6ebf1cc1988b24 chrome-gnome-shell-10.1-7.el8.aarch64.rpm 723b8309905fc5991a5d4cb07a3abfe1d489c5276c466ac59ce3ba0feae7fc24 enchant2-2.2.3-3.el8.aarch64.rpm 78f5e5ff3a4e5f15c0c2f33f59bccc645bd72f401d96147c6bcebf33193329f1 geoclue2-2.5.5-2.el8.aarch64.rpm d14736d9c21066b465f159da859c802717baa8ad3d89c8d1f65b17d9b461ea2f geoclue2-demos-2.5.5-2.el8.aarch64.rpm 531d25660d6a0c554c877a67d2c0db91665f2f48df43ebfd973ec44c3ebe65a0 geocode-glib-3.26.0-3.el8.aarch64.rpm c764144bb23286057a4e248a20113347792766070c5c5287b495f05d1c55f7e5 geoclue2-libs-2.5.5-2.el8.aarch64.rpm 805dca80df56554eac9e6f091c543b896a4c4880212925886ac6169c71b363a9 geocode-glib-devel-3.26.0-3.el8.aarch64.rpm 0460c2bc74d6eec4513e14656fdbdcbfb24572029b5d6d8ded982f024bf8981b gjs-1.56.2-5.el8.aarch64.rpm fdf3ffc5c1ff519b175992a90c72547c6b780c9ff109c9d81d2373c85d710b82 glibmm24-2.56.0-2.el8.aarch64.rpm 26b7d22656e28201d6b9acf35a6d5c93174646153b16b99da6d57bc8f2b12226 gnome-terminal-3.28.3-3.el8.aarch64.rpm f8dfbbced6e7790bab0de7117a7e9946c0c1cb0868016fbde94b2157265d4867 gnome-terminal-nautilus-3.28.3-3.el8.aarch64.rpm f92d91eee8297488a7829d7e2b454118455a85a5234e98b6acfbe0b6b36ff7f5 gtk2-2.24.32-5.el8.aarch64.rpm 73089b6b7aca3af1f70643b1edf74b4f43cf10bcb9fa567d8feb0f8e71cf326d gtk2-devel-2.24.32-5.el8.aarch64.rpm a18ad62a1a55fefbd4cfb650836190faa7be7e5675b4661f03d97e1567f40639 gtk2-devel-docs-2.24.32-5.el8.aarch64.rpm 36bac44eee7f209e8523cd9fefb1eae20dbfb16ffc0278cc9a286be69aa4cd46 gtk2-immodules-2.24.32-5.el8.aarch64.rpm aa23402f778aac0722e55282dafd2cabeb15d11caaba400ae320314d25c39b12 gtk2-immodule-xim-2.24.32-5.el8.aarch64.rpm a78a6496f35f33e1da31ba895d09a962cb28712d61d011f3aed37cbc46f1ff0d gtkmm24-2.24.5-6.el8.aarch64.rpm 264cb45829060071604f329dfc17c52a9b0547cb90c498f1c74b39ab0fd12ff4 gtkmm30-3.22.2-3.el8.aarch64.rpm f64becfd98e7799ae3b3fea955242c51870a9478b136e6a4c27a0de42de89414 libepubgen-0.1.0-3.el8.aarch64.rpm c7df0a84d2b1a8aa385b2106d754afadee273b261da070b786adbdf7f2ddf77e libsigc++20-2.10.0-6.el8.aarch64.rpm 2bfffe5e1c0bcc1e8674ae01b0c82e4dd66604aa4621e2bb926f4e2c69f9bfca libvisual-0.4.0-25.el8.aarch64.rpm 726453831eef6f079cd7248861cb6820b402538b619ad07f66e794f17e7a9c86 OpenEXR-libs-2.2.0-12.el8.aarch64.rpm 8188b9fb4c1c5601782c6ffe14b79a453e6074a17c9e421b93c8832a73acec4d pangomm-2.40.1-6.el8.aarch64.rpm 86c83acf1fa6495905a0ea5561bfded481c4485f82422e54084832157862bf77 soundtouch-2.0.0-3.el8.aarch64.rpm 02a22b986b4fb288ccaa7ce65f2a1ee22b43cf9eaba49eb62d119dc5a7eda109 woff2-1.0.2-5.el8.aarch64.rpm 40ebb3b882b339db547df15724f48b5e1f424dc64f64b0f67e9aceb5936f582c RLBA-2021:1591 libxslt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libxslt-devel-1.1.32-6.el8.aarch64.rpm 706866799dfe25420e7c8cc1768228ddadb48ba3dfb81db2b04b8120d16e52ac RLBA-2021:1612 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms avahi-ui-gtk3-0.7-20.el8.aarch64.rpm cdd8a7fd8b3ef78adc7fe119dda807d09897aea00c0029e05bf161f82cc9cd5c RLBA-2021:1619 efi-rpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efi-rpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms efi-srpm-macros-3-3.el8.noarch.rpm be93fbe5d15a6af78df7e5441fa6c0a13ef4d4ca73431cd7a8e49c691aa3442a RLBA-2021:1681 vhostmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vhostmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms vhostmd-1.1-5.el8.aarch64.rpm 38a617881b0359a544e59872a750e2bdaeaf0290a15ab1ee5aed50d4df1c7d8d RLBA-2021:1687 dejavu-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dejavu-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dejavu-lgc-sans-fonts-2.35-7.el8.noarch.rpm fb84cf5353f07a8ab165754d6c92b019a12bc879457165766e30dc960b338c83 RLSA-2021:1702 Moderate: brotli security update Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for brotli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms brotli-devel-1.0.6-3.el8.aarch64.rpm 46d16afb4ba61f26cd618cf0f3c8d483e81283192b9dde1c3f647b92db45a2a4 python3-brotli-1.0.6-3.el8.aarch64.rpm ba9deacc7f7427029f461da1126eaa4dbe34fae02382f5154b0b934271840863 RLBA-2021:3594 libdb bug fix and enhancement update The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) rocky-linux-8-aarch64-appstream-rpms libdb-devel-5.3.28-42.el8_4.aarch64.rpm 4b08c5f55c7114c27dcbd511ad3313fc7a4227cead74330c4c88a48cbe7eadfe RLBA-2021:4353 lm_sensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lm_sensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms lm_sensors-sensord-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 49265ba4b6e4e48107a920813440bdf49bec4234616b87941dd00b3aa88ac5cc RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-autoar-0.2.3-2.el8.aarch64.rpm fbc3fe4286ccb668a28a5e77e81a5a6168b5102e62df938ae1e0ae0254211336 gnome-calculator-3.28.2-2.el8.aarch64.rpm d5be0d5f7a52a7d78efd9cd3479fcefd3b2066dd9cb0763879756c7daf7e87bd gnome-online-accounts-3.28.2-3.el8.aarch64.rpm 7f980408ee85f52bbe609f98ec0072d234b74ebaef7ff50ca365c39bb2b05556 gnome-online-accounts-devel-3.28.2-3.el8.aarch64.rpm b3abe2f8d470d01afef68ec64b32b4aac8d10983e48297aaa6d396763dbcd70f gnome-software-3.36.1-10.el8.aarch64.rpm ed8578b49a2436b9230097923f6e201f6204871f7dab5ab7deed937564827de2 gsettings-desktop-schemas-devel-3.32.0-6.el8.aarch64.rpm 300152cfdeae8511130d27b6d054c3c1a420e210fb68334cec75b58a9e5c1273 vino-3.22.0-11.el8.aarch64.rpm f7c480d9e635457e04b43d29b74e3774159d73b9b002272b9c83805987ae28f6 gnome-settings-daemon-3.32.0-16.el8_6.1.aarch64.rpm 412d59e74df9a3b02f9d0d4dd6064efe40a461791a7770ba873734e98f58bb8f RLEA-2021:4405 libmodulemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-libmodulemd-2.13.0-1.el8.aarch64.rpm 56e3d5cc65fe5b3683a89f63de9952d928aca6f94b45bf86e3cb1c2b70ce2678 RLBA-2021:4412 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mvapich2-2.3.6-1.el8.aarch64.rpm b1aebcdc87f0261ceb24d980f82bc95d2a31e14235fe6a71de0d0d18cfca6458 mvapich2-devel-2.3.6-1.el8.aarch64.rpm 7ea67dfb81842a06d2538737838e0772a4d7ae0084c3ca5a3c4baf7fe76e2e12 mvapich2-doc-2.3.6-1.el8.noarch.rpm 9aaca96ccd26080a515d39ee7b7dd5ed0bbd699c05ebdd970ab8a94e4008c188 qperf-0.4.11-2.el8.aarch64.rpm b323d49e682b75dca1735c37b419daa39f030819371a5a7c8a81264e24fde4e1 rpm-mpi-hooks-8-2.el8.noarch.rpm 4a022972f93d34ec9ce71ae06cd75a345fc2cfd6cd6c145eb39b7e39e8b05e85 RLBA-2021:4442 lshw bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lshw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms lshw-gui-B.02.19.2-6.el8.aarch64.rpm 1539690fc10466b0ef69b0ae36831386ab8361a81537cfc1144c0079e1a3d581 RLSA-2021:4451 Moderate: gnutls and nettle security, bug fix, and enhancement update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nettle-devel-3.4.1-7.el8.aarch64.rpm 29cbbf93ad9a8e3a71f337af29bbaf4b6c2b1c853ab35a09d7b8540b97144459 RLEA-2021:4488 hwloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms hwloc-gui-2.2.0-3.el8.aarch64.rpm f5b048d8c4085dbe1d9aa0d154f44337edb4323f75537e20e5b1acd2b703d6ce hwloc-plugins-2.2.0-3.el8.aarch64.rpm 9d4c85fd7eb0407084e97b77b59639cc595354d4fd6c4fedd84a589ebaa3d810 RLBA-2021:4501 emacs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms emacs-26.1-7.el8.aarch64.rpm 8ac725aefb40e71ba15db61ca4b66e78b9c846f44e0d8b32f76b5684e8f8db0f emacs-common-26.1-7.el8.aarch64.rpm 5712e4d0277c39f4144bba478f53990926f1e8f00dd57aa46f512edce047ca3b emacs-lucid-26.1-7.el8.aarch64.rpm a77ba0dc0e41997033028feb31224b9dc63e0194a8fc97c6b556a10429719619 emacs-nox-26.1-7.el8.aarch64.rpm 6d1a93df4f0b9ff4c174c86d622e40f45a925544df6545197693b4eadbbaebee emacs-terminal-26.1-7.el8.noarch.rpm e2e3fd63ab15f4edf00ab4a77ee73deb0fe6888c2defe538678ed766729d2c42 RLSA-2021:4510 Low: lua security update The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms lua-5.3.4-12.el8.aarch64.rpm 79096cfc6bbc5442394e2f93e2875c2f2872f37cc546a831339589b593c761b8 RLBA-2021:4516 usermode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usermode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms usermode-gtk-1.113-2.el8.aarch64.rpm 45d62cf3d6e06b794920c84e637de3a7e262e13fce0b72a45071a65a3e5b24f3 RLSA-2022:0658 Important: cyrus-sasl security update The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cyrus-sasl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms cyrus-sasl-sql-2.1.27-6.el8_5.aarch64.rpm 03a8022248fd150a1f099fdb60e6352feb0da492251db50c807a411eaf770feb RLEA-2022:1954 perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.aarch64.rpm abe4bdd7613113545004276a66c641477d976e68067363287c9615113015ab85 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2022:1956 perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.aarch64.rpm abe4bdd7613113545004276a66c641477d976e68067363287c9615113015ab85 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2022:2014 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mpich-3.4.2-1.el8.aarch64.rpm f41670651ea265c4d67ab003d13c2f05c248faa51bc4020d6d868179db5a209f mpich-devel-3.4.2-1.el8.aarch64.rpm 92e6339fb31824e9e63dff5dc05e2e318f9c2d21545a2316cc42168db766dbab mpich-doc-3.4.2-1.el8.noarch.rpm 785f500c25e4018f095172a3c27bebc89dc8e5d0289b3e77f82f69412dbed17d mpitests-mpich-5.8-1.el8.aarch64.rpm d151eabe92eb270d81f9031f6f3b503f1247c891ac93aa2d6a6a619e85eb7ac9 mpitests-mvapich2-5.8-1.el8.aarch64.rpm d5b143ba64b1cc79ea9f5ac23184cf6144b1ac7cf345e328c09905dcb2279435 mpitests-openmpi-5.8-1.el8.aarch64.rpm 18beeba35e7afa4f5b557a0d01c58691b06ca125a6b5fbd40b1ef06db7b285b1 openmpi-4.1.1-3.el8.aarch64.rpm ed53a46ff4e6f45e181122f4f0b1d5b7f4a71a1ce90d9adb3611c4b998e99334 openmpi-devel-4.1.1-3.el8.aarch64.rpm 99f4b08d781e5e602b90ccd573a1ce9d1242e3f4f7a8f6ded671538c37759cc1 pmix-2.2.5-1.el8.aarch64.rpm b82e26d356325d80852fd0623b782703f1399fc7ef2c67e661af2a00aa51b2f8 RLBA-2022:2023 net-snmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms net-snmp-5.8-25.el8.aarch64.rpm d8ea7c931c29fee3d8caeeaab13beb8f7d4fce5918bfdb85197720a74a1b6add net-snmp-agent-libs-5.8-25.el8.aarch64.rpm 46d2c5a54207f2c6afdaa5f3685eccdccb4e58df60c733e2ccf67e4b44c703ae net-snmp-devel-5.8-25.el8.aarch64.rpm a152230374f5a6ccf08a4c634bc5622c0937de9603226857691b80f761a6cee5 net-snmp-perl-5.8-25.el8.aarch64.rpm d55cea700a23b95291c964d1eddb6db1f0b9693bad692e73762928501c527ee1 net-snmp-utils-5.8-25.el8.aarch64.rpm d06dd63058c6e388f62acdc321f4fc31a39bca3b1464f53172c7779f7f0c0768 RLBA-2022:2027 json-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms json-c-devel-0.13.1-3.el8.aarch64.rpm f13877f195ffa5a2982cae5678d1a0b85e90c46226321273da81184d31b92686 RLEA-2022:2029 libseccomp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libseccomp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libseccomp-devel-2.5.2-1.el8.aarch64.rpm 42f2d500dae04e06e3190a08396aa560b54a575f8d890f9a5cf24244d016e09d RLEA-2022:1869 new module: perl:5.32 This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl perl-5.32.1-471.module+el8.6.0+879+823e3012.aarch64.rpm dc76d8be1e14f2c351aaab1718556eceea718e11fb08edda424c985c4eec075e perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.38-3.module+el8.6.0+879+823e3012.noarch.rpm 896f84217933fb9a1911087752ad7ce902692834a7f81ecd56a4398c257d8568 perl-Archive-Zip-1.68-3.module+el8.6.0+879+823e3012.noarch.rpm 0f0f6f60858417d44fcad3e03f74afd274ff40a01e8c09a22bb60e7c7b23528f perl-Attribute-Handlers-1.01-471.module+el8.6.0+879+823e3012.noarch.rpm cc69147359fd01e984e9f0b7f1fd57b6c3af33351c1f0e76c70e51e558742784 perl-autodie-2.34-1.module+el8.6.0+879+823e3012.noarch.rpm 91a1b226f91006b0ebc5918e12786feb3c381e1950372d21cc6883b6b6806d0f perl-AutoLoader-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm 84a78350d8c8da6478e9e0094084a2e034ac6cc0bff0596162d97b4576f54d3b perl-AutoSplit-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm b508bb6e554d8d9ff38a882a93e738ae308aed39dbda2ac9d5d841a423e1bfb4 perl-autouse-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm 6f75d27406d5b3a1b63d39f0e5e2418292b507d737a52abf0b89afd33b24c135 perl-B-1.80-471.module+el8.6.0+879+823e3012.aarch64.rpm 62a017f0555fcc415c7fee5e668324b7d15a73ac12421e64f30051ded09f53fc perl-base-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm c6a793847ad5c6fe6d21886cb9904514ee014e30ca492d8ed15c18598d2bd473 perl-Benchmark-1.23-471.module+el8.6.0+879+823e3012.noarch.rpm a6c81a824472718a9198558a0687ab69db6862c738c927e118c6e45f1f4f8e36 perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d perl-blib-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm a716d8647407047b09d14beee6f214e4ee69b74d9116a0098b529ea931413321 perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm 9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890 perl-Class-Struct-0.66-471.module+el8.6.0+879+823e3012.noarch.rpm 4eafc5acc7cb511c424861388d5f194496055cdf049e93972994560a7336da20 perl-Compress-Bzip2-2.28-2.module+el8.6.0+879+823e3012.aarch64.rpm f59bd19b1a056fb2839075bbc36948920a47e96221b726ce765b414eb6a16c3d perl-Compress-Raw-Bzip2-2.096-1.module+el8.6.0+879+823e3012.aarch64.rpm e04fd06ec4f4c5ac4e539a3af25c7dd25f6cd0c3dab9c6b79448f6a2686460cd perl-Compress-Raw-Lzma-2.096-1.module+el8.6.0+879+823e3012.aarch64.rpm de80472546f9e9cf36e34a6df988e90fb9784394da5f4752e8bd7424776fa252 perl-Compress-Raw-Zlib-2.096-1.module+el8.6.0+879+823e3012.aarch64.rpm 04b0c1d243ab33d6d6cebe1d2d84c3ceb2965b6acd266e08d227330ac81f3c2c perl-Config-Extensions-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm 10a6e54bd41bec4d64444794368e65fcae0a815e1c46ac16df2d429605a4398a perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm 8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-CPAN-2.28-5.module+el8.6.0+879+823e3012.noarch.rpm 76808568b4b4172edfd6333435186bf4c13a99d791df3c203b08838d263b9363 perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.aarch64.rpm afdb8a6a46014b6875ae047cb29ad08d994aa0e68d0c349ade129346904f5b0d perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm 73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02 perl-DB_File-1.855-1.module+el8.6.0+879+823e3012.aarch64.rpm 847ecd2c407af782ca63db6098c2167b58b4b39b9399c79dd9bfb56f4cd5ecad perl-DBM_Filter-0.06-471.module+el8.6.0+879+823e3012.noarch.rpm 348f6ebd9008c5c43add4cf5414a5507b2b8fccc52b223a8a63f172171f06379 perl-debugger-1.56-471.module+el8.6.0+879+823e3012.noarch.rpm 418c8ef9746af37f5efd28733d8170cf0149145101f129af40d69d3b41aa00c0 perl-deprecate-0.04-471.module+el8.6.0+879+823e3012.noarch.rpm f51735ec38fd9bf505928fc67e352a0f953d0ab07a3c2e3e17b070c07599e9d7 perl-devel-5.32.1-471.module+el8.6.0+879+823e3012.aarch64.rpm 90b30aee082cacc474fb0cab32ac233b2350f39cb39c64511a5745b948143a29 perl-Devel-Peek-1.28-471.module+el8.6.0+879+823e3012.aarch64.rpm 6b61d9811916d3ceba63d43d92ff7218be384814ee3c2f7caa7ab960ecd4d68f perl-Devel-PPPort-3.62-1.module+el8.6.0+879+823e3012.aarch64.rpm 21ae2662f2357bfbb037262a175c8eda1d5bbd9090b71dadba2e78b56e627700 perl-Devel-SelfStubber-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm e22f51e48176a831edd9a927e323164bc8618a5dd95bd9ff16284eaafeeff7e8 perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.aarch64.rpm 41b678e29dfe0a2f79a0148857d3e76c4bef58b7960fcede4f5ffb95448d9f37 perl-diagnostics-1.37-471.module+el8.6.0+879+823e3012.noarch.rpm f1e7e8876bf518814158e6226ca5689d62aaa70d5ea2bf7480fde79e1a812573 perl-Digest-1.20-1.module+el8.6.0+879+823e3012.noarch.rpm 054f0b929f4291d597147ae000c3849fe5609243f724a30ca4ae58ece1936c7a perl-Digest-MD5-2.58-1.module+el8.6.0+879+823e3012.aarch64.rpm 32ef413a02af5163186455ffb14cf9c83c3c29fafb3575121722a8546fa573b0 perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.aarch64.rpm b428259f726200b5e030e3931252b58379e0d8a7225d5d3a5cad3f7f7864fc4c perl-DirHandle-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm c6ee20a81e7bfc9ec89a2aefab9f8b74ae9d339ce1e2802d7f9584ff8b926af8 perl-doc-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm 49178342c4ec2682002c7312f5b95cc9d1190dccd40132ea4d45ae0f97ddcc98 perl-Dumpvalue-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm 5d76a0f039c461e9d72ce162188488f43829dda3fc4ffad9e7b3066f70bff5c0 perl-DynaLoader-1.47-471.module+el8.6.0+879+823e3012.aarch64.rpm 4dab2f753f65b234ac17de2b02b04613cc8e4cda2b2eefbbd2492ecfa30c8e2b perl-Encode-3.08-461.module+el8.6.0+879+823e3012.aarch64.rpm f1bf27bd1b6fe8666ba94c4494c99c258207ab0b5e3802eb9e4bfcca9a562b9a perl-Encode-devel-3.08-461.module+el8.6.0+879+823e3012.aarch64.rpm db5b90e3ff1f313c7f9de62f1f6da6d476814d9ba6801b3131f9f3e2a983496e perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm 85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0 perl-encoding-3.00-461.module+el8.6.0+879+823e3012.aarch64.rpm b00ddde1371796f9068abf7615d5f0850bdf2d2301a2062a53f0b190e3190bbb perl-encoding-warnings-0.13-471.module+el8.6.0+879+823e3012.noarch.rpm 64c4fc68f3055231b42198628030f3eb35bce6925937afec70cb8ef742b059cd perl-English-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm 0bf7dbe90229ba650801a73951c9f7dabb1f93f745c69c10d244617b24ec596f perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-Errno-1.30-471.module+el8.6.0+879+823e3012.aarch64.rpm f78b3db33246b012a60e010f0f455a77773d9667cd53b79b80d2678dd1e24a7b perl-experimental-0.025-1.module+el8.6.0+879+823e3012.noarch.rpm 1555a407b267cc6961b4a836488b8857e96faf10570d36d00efeee1b9d1bf0fd perl-Exporter-5.74-458.module+el8.6.0+879+823e3012.noarch.rpm e42ec395bd22562922325052ceaccf8aba76cab83bf75efa674282ec0be84312 perl-ExtUtils-CBuilder-0.280236-1.module+el8.6.0+879+823e3012.noarch.rpm 1bb0da4c8be0ca3f8a39f80f00b6e481a4a04350be1fff0c93cbd9e80f184ee9 perl-ExtUtils-Command-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm cfbdcdf18c92f3191c5e755c36991b89d7bbaa9406c03b32162e3ab6d3993f43 perl-ExtUtils-Constant-0.25-471.module+el8.6.0+879+823e3012.noarch.rpm cdfe69802b3790de366257454e341b8aff534bb220f46077917f8846269f62d1 perl-ExtUtils-Embed-1.35-471.module+el8.6.0+879+823e3012.noarch.rpm d8c27fda2d5764245ebd0484d5c3b3872f0c757d632841d401ffbc02e2ab4f8d perl-ExtUtils-Install-2.20-1.module+el8.6.0+879+823e3012.noarch.rpm fc5be11468e3fccc2a11d2de9121a6cdd6df69205ca5494391da4385ec119563 perl-ExtUtils-MakeMaker-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm 3c150eda89de5b4eb449318b79c0943e143c1b6e0332a8d05eac98afa6052314 perl-ExtUtils-Manifest-1.73-1.module+el8.6.0+879+823e3012.noarch.rpm cbc7809caf4d53a1596e607b072e1280b86f8f8c61674bef764916490dc6906c perl-ExtUtils-Miniperl-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm 81e895a84c42621ec5223c35358f73ad023af2536932076b0f9e551442f5e14e perl-ExtUtils-MM-Utils-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm cefed0569fcb3467aa060fe8ed4afd30715c0ae724ce44a4e60ba939f72354f7 perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c perl-Fcntl-1.13-471.module+el8.6.0+879+823e3012.aarch64.rpm 5970dc5bcee12a8f1ec9b0ab990d093fb65a5d4f9b063a1ddeb058b9afbef327 perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-fields-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm b3bcc175fa8264d466885d81e1719ed5507b3ebf7110d50ead611ff6f1fb7bfc perl-File-Basename-2.85-471.module+el8.6.0+879+823e3012.noarch.rpm a797d34356e7273efedb3109544f0ec6372498e0faee26f269196de0da6f2b3e perl-FileCache-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm 05d65b299e9b9e5f3cc3121c33c102ccb988512d183799f9d8443e30157520fc perl-File-Compare-1.100.600-471.module+el8.6.0+879+823e3012.noarch.rpm 261019cdcc5442317525d4485702f38c6970a23fb5eb91e21a00b9aef1b51971 perl-File-Copy-2.34-471.module+el8.6.0+879+823e3012.noarch.rpm ae39110ad6194729ae242bcd0ee73f40540a5a7dd419addd6c71c1cf662a4407 perl-File-DosGlob-1.12-471.module+el8.6.0+879+823e3012.aarch64.rpm 01d56b2c4e62b3008bea3486fad8dd276a8ec016ea452303283a3e8cc6890423 perl-File-Fetch-1.00-1.module+el8.6.0+879+823e3012.noarch.rpm a19b297b723dae8f070e6747f43243135103f21e8b7d8d7553310e1ac1f96d8e perl-File-Find-1.37-471.module+el8.6.0+879+823e3012.noarch.rpm 511e8ccb46054fa69d53e80bd671c65284526b9f4eafcd322ec38e976b16698a perl-FileHandle-2.03-471.module+el8.6.0+879+823e3012.noarch.rpm 371527cfd57f724e8f7d976b02243c713ddcb7998fd1591031195b84ace3c526 perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm 995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11 perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c perl-File-stat-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm ceb6a060ae984f2efece2712dc9d1cb1fc14a2aacaefef858c780ce234e969c1 perl-File-Temp-0.231.100-1.module+el8.6.0+879+823e3012.noarch.rpm fca98aeecb539f5f2553808ce3bc203a8740a01ef0663149256d024bc13823cc perl-filetest-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm 8564ef1f84399cfbc09d27d6567a5dd5996f47cfdf2384a58a1c5191a8eae071 perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm 5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d perl-Filter-1.60-1.module+el8.6.0+879+823e3012.aarch64.rpm 41c4e941da80c7aa053fe0422ec8b8995f181e0ebc8ff647a0376b8216cec110 perl-Filter-Simple-0.96-457.module+el8.6.0+879+823e3012.noarch.rpm 6d8cb469ec7e7529d67609f167434c267aefb6d153c98733d6a446086d68bb0f perl-FindBin-1.51-471.module+el8.6.0+879+823e3012.noarch.rpm 56d14f944a7fcf10ea8ed5579038d32088058e32ab5182135afacdd246685634 perl-GDBM_File-1.18-471.module+el8.6.0+879+823e3012.aarch64.rpm 50f16beae89da4e5e073f80a2634347c1f52854c708f597433eab9e53edfc98a perl-generators-1.13-1.module+el8.6.0+879+823e3012.noarch.rpm d29e5ee3480ccf6127f8e2334cc6492d37fd979a629a314c83387753d227be09 perl-Getopt-Long-2.52-1.module+el8.6.0+879+823e3012.noarch.rpm 5090d47b718450f95444543eaca7222ba73e43d2837b592c56f5c983355e2fcf perl-Getopt-Std-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm c385e938af9008822ea9e471a00a055cd2a6208b4855c2b7647fe234c04f55d9 perl-Hash-Util-0.23-471.module+el8.6.0+879+823e3012.aarch64.rpm 6669ed35fd8748b8fa4b4d24b79770efd15e2face26be067b5ff02f05ed4b992 perl-Hash-Util-FieldHash-1.20-471.module+el8.6.0+879+823e3012.aarch64.rpm 580bdd485cb03fdf36c64f07a42094760c39a21b1f649563f2b0dba4aa76cb7e perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853 perl-HTTP-Tiny-0.078-1.module+el8.6.0+879+823e3012.noarch.rpm 5f65138b4d1d4d31ec4ef9d4ea3ef8a59eef998f0480ea0dec2dbf644b63ae57 perl-I18N-Collate-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm ddb8549326f4c53d3e63ebadb3bd15006b623554ee919c3aefe61bd9d69dc9b2 perl-I18N-Langinfo-0.19-471.module+el8.6.0+879+823e3012.aarch64.rpm f053286915d54e1e44fc55cfc5d1ba0a8f99984aec1a0b860d7aab625e6a6129 perl-I18N-LangTags-0.44-471.module+el8.6.0+879+823e3012.noarch.rpm 39548593db24c273c66016fb982e7982326f3494a17553d011567f4db7b188fd perl-if-0.60.800-471.module+el8.6.0+879+823e3012.noarch.rpm b5af25267734d759f7bfe75dd79437be719dbbf828dd356ab2f13648fc0f046a perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm 46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-interpreter-5.32.1-471.module+el8.6.0+879+823e3012.aarch64.rpm 7b828131cef6b8339c20195c66dc0436bd2969a32ff8a30429b60903cfba8369 perl-IO-1.43-471.module+el8.6.0+879+823e3012.aarch64.rpm 26aaa713dcc652dd9c49031778ff6f9c5d863feb1e2aeae3f5e2721211b4f069 perl-IO-Compress-2.096-1.module+el8.6.0+879+823e3012.noarch.rpm 05418030256a705280d58c0e7a44134e578593acc935342159ee8b4339a8bb57 perl-IO-Compress-Lzma-2.096-1.module+el8.6.0+879+823e3012.noarch.rpm 343d36d9129f80e8a302644b6eb13ef5b97f2066b5ab06e268ca6553100d97c2 perl-IO-Socket-IP-0.41-2.module+el8.6.0+879+823e3012.noarch.rpm 82c29b5fbc0a72d196b990b51c051b0fd4c733d024f1b8cd646dfb9ea98f0e5e perl-IO-Zlib-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm 023590025fb11cc0eb9d6205e5ff24b371ff751c8e1e8b39ef4049d1807692c0 perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm 24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36 perl-IPC-Open3-1.21-471.module+el8.6.0+879+823e3012.noarch.rpm a0f7e9bccac2bfd7f926690a876853388c61c46f9bee71ee77dd63dc04ab4610 perl-IPC-System-Simple-1.30-3.module+el8.6.0+879+823e3012.noarch.rpm 351f74beab3545664c924ad1c77b4640a278dd7e4e7429def448839b66a3880e perl-IPC-SysV-2.09-1.module+el8.6.0+879+823e3012.aarch64.rpm 6caeb22a5a434a1a1c219434c9c553b414d0c13262ea562ebb2e5a8ece26ecce perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1 perl-less-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm e1557f0a82c4bd76df1a36ea09c4b2208264606b14ebe7fb490b68f6f6e47dac perl-lib-0.65-471.module+el8.6.0+879+823e3012.aarch64.rpm 9ff9e5e94d0875eb287aa4f6ba968077c96e40d17d118d817c4a265df79b19b8 perl-libnet-3.13-1.module+el8.6.0+879+823e3012.noarch.rpm d06402fd430d3442bfba5a8d8c5a82038d3db5ac31ac5b0e464eb8ad78d756c6 perl-libnetcfg-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm d97bca5e252435f16cb6fde3433756b503a5e1f4b64cb2882b4eb802aba6e29e perl-libs-5.32.1-471.module+el8.6.0+879+823e3012.aarch64.rpm dfc6972b48e218263b211f42afeeb38b9b105a197a2bfd35970c9095a0dfe4ac perl-locale-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm 34eebbec86c2085e4659691f3138bbac03e164da2fa0178610cc19d48464dc10 perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e perl-Locale-Maketext-Simple-0.21-471.module+el8.6.0+879+823e3012.noarch.rpm b80618e4f4845f86e83404fc38505cd233f225df9adf7b123747f19f67b08203 perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8 perl-macros-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm b9b653274abf61f37d7e7e71ddec801dd21eb8720899da487981c39b1df181dc perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.aarch64.rpm b2738ffe053d7a125fbe0294af2ce7b9e2c0a9ef972822671a4e1689228f109c perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-Math-Complex-1.59-471.module+el8.6.0+879+823e3012.noarch.rpm 6afdeae53c444f636af1d353715b9e87d143502cf01f6fe4ebf21d55964efa5a perl-Memoize-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm e640b0075b3b18645576b21b2b94122eb6356596edec3d9735883df6e0d6b036 perl-meta-notation-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm f8d9fcba8446cfe4269dde3e5aa29c1346db382ba89414c193f9c1c1639d14e0 perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.aarch64.rpm da2edcc116f5d66f6eb2dc23819a8e0f51e330373560ec0545871b3ff0bf4c96 perl-Module-Build-0.42.31-5.module+el8.6.0+879+823e3012.noarch.rpm f8d22bd91df7e742342d514b89fd5bbf1210bda859a600e23267b5087a361696 perl-Module-CoreList-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpm 7d6c1bdb41c206e5b62df1652fd1627fced6df877244ad48ada69faa84ca496c perl-Module-CoreList-tools-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpm f16595a91826bc713cf1b3699a9f76b4cbec2c994f0214a07c4824db64170d77 perl-Module-Load-0.36-1.module+el8.6.0+879+823e3012.noarch.rpm 15c2aa6d684ac14cb382c3969cfb118abfc38744bb8543d35ad9017e759adbf1 perl-Module-Load-Conditional-0.74-1.module+el8.6.0+879+823e3012.noarch.rpm 2227be4711dc435a31aaed4b5f1cfc3a646025912e8c74aafa1f7d971134f6c8 perl-Module-Loaded-0.08-471.module+el8.6.0+879+823e3012.noarch.rpm 234b1102675736344a4e0bd6cfad9f73f37771a3b9e73c48c6ee7f0c36aef802 perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm 23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79 perl-mro-1.23-471.module+el8.6.0+879+823e3012.aarch64.rpm 79602fe0090e4c572b62a2a920fdf0f085faa2b37f9238a06b2c757e47b80363 perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-NDBM_File-1.15-471.module+el8.6.0+879+823e3012.aarch64.rpm f499f97205e238572b2223db7f47adf3b6df182dc59c4a8d71ee7d83351f0fa7 perl-Net-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm cd5856fd6f47a143c5c60916504482e3798b06c54421870119f441a5fd0f2a4d perl-Net-Ping-2.72-471.module+el8.6.0+879+823e3012.noarch.rpm d738802084565dab57fab502d0975c5d483fbaf7a348d64075c11c6622a971a1 perl-NEXT-0.67-471.module+el8.6.0+879+823e3012.noarch.rpm a44972702c8e4ddf7f4a18cfc7ff52385f1dee67e3df11f9d16e0e449353954d perl-Object-HashBase-0.009-4.module+el8.6.0+879+823e3012.noarch.rpm 5bf571fb3b59b5580204b90a299cd8b647215bae2bf17cff6332289ca31c00db perl-Object-HashBase-tools-0.009-4.module+el8.6.0+879+823e3012.noarch.rpm c35b94f76b882d2b5a55ad03d3726a9726ddc541eecf8b2eda38ac4bf7cf7d6c perl-ODBM_File-1.16-471.module+el8.6.0+879+823e3012.aarch64.rpm dfa2b9c45f41ab3b64dde0404d84cf620a723efd9ac3187b3a7856c89186b5a5 perl-Opcode-1.48-471.module+el8.6.0+879+823e3012.aarch64.rpm 48396f4dad07f4f99b7646e9f40c2f3c3c01df8723f89f615b707cf37fbb559d perl-open-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm 8fd5bb3e31b79691129dbbbdca582e3090393d4ea59874610b6319b2a20b6d0c perl-overload-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm 56a29401904d3c7c9948d7f020b81beec209dbb1007daf4b7d0efeca028549a9 perl-overloading-0.02-471.module+el8.6.0+879+823e3012.noarch.rpm 6a85f75028ac3bcd321e3a362f16a5aa6f9707ac0531e4b9d7879c4497347c8f perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.102-2.module+el8.6.0+879+823e3012.aarch64.rpm 6ffee7b2555fe0fd6ef595282b494adacfd9ca024dde5331814c4bc6c42b2655 perl-parent-0.238-457.module+el8.6.0+879+823e3012.noarch.rpm 246f2b9cf71c9ab37e60447253c7bc23bb90e394a09471c13ad513863cb4b1d2 perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.aarch64.rpm f1c7d8bfb0ca6183c86877ddd7b371e7a67a127e34ba374d0700df2571783514 perl-perlfaq-5.20210520-1.module+el8.6.0+879+823e3012.noarch.rpm 628f7642581468e6dcdadf1f23fd561deb8472e2962a5bf8451236e21f1762a4 perl-PerlIO-via-QuotedPrint-0.09-1.module+el8.6.0+879+823e3012.noarch.rpm 1f151cd4482a00b5c96dfffcb6bc340ef12218d63db6347c426feb154585cc60 perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-ph-5.32.1-471.module+el8.6.0+879+823e3012.aarch64.rpm c1783f13ff1335daaa5f8e97891b7cde953e162051670c6e3eb4eb0b54a534c2 perl-Pod-Checker-1.74-1.module+el8.6.0+879+823e3012.noarch.rpm 978c1a649e6dab3bbac23f87c6dbd967f157ca43b9eab4a2f943480f506414bb perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-Pod-Functions-1.13-471.module+el8.6.0+879+823e3012.noarch.rpm 13006d948d6a40dc78e9042d186528286fbb2b06e01239b8a140494291f30175 perl-Pod-Html-1.25-471.module+el8.6.0+879+823e3012.noarch.rpm 727afd865cc869ac175501107278a34bb09dc06f334f8c6981c226dd43878c3f perl-podlators-4.14-457.module+el8.6.0+879+823e3012.noarch.rpm 801c287bd1847de60e53e057f36994f48477983773c1f5559faa303651acd9fa perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Perldoc-3.28.01-443.module+el8.6.0+879+823e3012.noarch.rpm a0f8f74314bf2558c2294c10bbae789bcca2477c8f06fdd9fd3dfd6b89519a8f perl-Pod-Simple-3.42-1.module+el8.6.0+879+823e3012.noarch.rpm e146ad799d75b5bc4ef12223d1dbb0c1ab3571ba6dd8b6a35425ed064a679b96 perl-Pod-Usage-2.01-1.module+el8.6.0+879+823e3012.noarch.rpm f6fe843a228687f99d59ac574fa274c4c69c97e3e3a359c9113e94a3b18ddd54 perl-POSIX-1.94-471.module+el8.6.0+879+823e3012.aarch64.rpm 8fe9e1a512587d9fbc3c5fa9a509a7e64ee7db50e002151b538a66137c8408f1 perl-Safe-2.41-471.module+el8.6.0+879+823e3012.noarch.rpm 6b1e3f5e918c5d0403947dd664f95c805de54dcb9549c864ba3a3a54aea10f92 perl-Scalar-List-Utils-1.55-457.module+el8.6.0+879+823e3012.aarch64.rpm f78f7e59075a43d9b22f8c4533d98e06d7155b722ff73dd1609e03e1a78d76dc perl-Search-Dict-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm d64ba76cb75f264755f708d56d6f9221718a0b26a33601e5bd2e1e76c8db57e1 perl-SelectSaver-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm 6c0d785dab43b86be4465e8c1cf2218565fde7338b479e9e1df8e61728006970 perl-SelfLoader-1.26-471.module+el8.6.0+879+823e3012.noarch.rpm d9b165a64386b8743a80285fecf71fbfc182f4e264a60fd93d07618725b6472c perl-sigtrap-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm 3ea359b960bb85b474ee7d87a1d9e381f14e15bb4f01a101a1984f25f31de13f perl-Socket-2.031-1.module+el8.6.0+879+823e3012.aarch64.rpm c45a17f7f8897afac86d469a04fa425a3df1c37c2bd22160415094ff0b2ad50f perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4 perl-sort-2.04-471.module+el8.6.0+879+823e3012.noarch.rpm b8c97d9ce8146ffff05a7e6de6e37cf4bcc3874663addeebc3e84c66521053af perl-Storable-3.21-457.module+el8.6.0+879+823e3012.aarch64.rpm 4d06097aaf7c37b259abde526a6627998ab58de741935fe434ab4b105902f9cb perl-Sub-Exporter-0.987-17.module+el8.6.0+879+823e3012.noarch.rpm 87013bce0917524587738fe6db264ebe2fca53bb042673d9d2865a267046c3f1 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-subs-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm c154fc9f9df0ecd16a600eba0a3a720543878c26f7be70fc4805362bed3142df perl-Symbol-1.08-471.module+el8.6.0+879+823e3012.noarch.rpm d6d8b699f51f9de47e5410330493ee4aafee37f894f4e9ca6d8df35bdd6585c9 perl-Sys-Hostname-1.23-471.module+el8.6.0+879+823e3012.aarch64.rpm 1aad57573c448caf5b63753aed1002d721bab8a38df715545cbfd83efa3261df perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 8c376cd4f3a4a128ba9059b381585fd81b1e52a4d493dedb8aff24ebc643ac0d perl-Term-ANSIColor-5.01-458.module+el8.6.0+879+823e3012.noarch.rpm 567fd6cc0d686ea74e81200b960c825839cbdaf834cf2e40e2eea5d011eb9054 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Term-Complete-1.403-471.module+el8.6.0+879+823e3012.noarch.rpm 12cccb3cdcf19038d5dbfbf0f0d09ca461341842696b4daa9bec331a466fc041 perl-Term-ReadLine-1.17-471.module+el8.6.0+879+823e3012.noarch.rpm 373cac615872c1af5f6ca02a882bb150b5ad5c680257b86076443157463b0ce6 perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm 77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533 perl-Test-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm 491106e63923a68bc208d8ac4281ababe8d801c869a7590061ccdcb1efe9d93c perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-Test-Simple-1.302181-2.module+el8.6.0+879+823e3012.noarch.rpm dbb742a892e6dc1dcc16ee5b91c459c331ee720aa5ad1a0c6a5d3d682037122d perl-Text-Abbrev-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm c205e14663d76b9d00c6209c660a64a5ee997cc600cfd7693841b32dcb0ef38e perl-Text-Balanced-2.04-1.module+el8.6.0+879+823e3012.noarch.rpm 74e1307d9f4ac5e6855a7b9cfc7be52c146bf2460fe3f0286ed4a0e83bac4cec perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm 0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca perl-Thread-3.05-471.module+el8.6.0+879+823e3012.noarch.rpm 3dc885f24e1cfc994e854b3bff76c5eea91f4ece1502c945cb9da005d4bb4db4 perl-Thread-Queue-3.14-457.module+el8.6.0+879+823e3012.noarch.rpm 74c32c60d87d1fd0746e3607df03ff1a8f2a7e93b2510375fa2e64c483aebd28 perl-threads-2.25-457.module+el8.6.0+879+823e3012.aarch64.rpm 2c9d2e21024b47fd3d9ed5248fa6ab3bbbddc6e4da91673dde934248fef0a316 perl-Thread-Semaphore-2.13-471.module+el8.6.0+879+823e3012.noarch.rpm 1564920e001ac5edeb382e7195849fedd8981ea011aa4c17d842c1ee140681f8 perl-threads-shared-1.61-457.module+el8.6.0+879+823e3012.aarch64.rpm 3da7bae462a0873ddb0ce56235ce117bb8f6d53618fe906053e572cdef9d578b perl-Tie-4.6-471.module+el8.6.0+879+823e3012.noarch.rpm 6c25d1a7dd605049d5fe4f1504b4539cd57d976716bfe0f61e7ee3226f475f9e perl-Tie-File-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm 3942379ac44b5238773a2f01ff12230b5883d41147efcf0e67ec8d40848539af perl-Tie-Memoize-1.1-471.module+el8.6.0+879+823e3012.noarch.rpm bcb5ed9b4a09202bb78f4e6cf9b2101d6e1221e63fff35eb9ac6f634a9d8d840 perl-Tie-RefHash-1.39-471.module+el8.6.0+879+823e3012.noarch.rpm a2d31cf0bc263635ac976f8c69e3012de4770e2b35d2b1407153f9edf046ee2e perl-Time-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm e8e3ee9f23ae9a591471ad8da34d1625093cafecc5319ab419b30d936d3d19dc perl-Time-HiRes-1.9764-459.module+el8.6.0+879+823e3012.aarch64.rpm af517ad4b40c9f7820aef491c86c5ca696a63c22c80d34c5a3a489b6d740c411 perl-Time-Local-1.300-4.module+el8.6.0+879+823e3012.noarch.rpm 48049d3cd87b9332801907c518df9bb4ee8e9f0cb20c2f18cf9cfe1ac794adac perl-Time-Piece-1.3401-471.module+el8.6.0+879+823e3012.aarch64.rpm 40d7fb066a1e45ffb4bfcbec8f76fbc110200cfc48d9001578e0d8a6f9a4b44c perl-Unicode-Collate-1.29-1.module+el8.6.0+879+823e3012.aarch64.rpm e2ecbfd0271ce4e8b3b4e5a0eaa42d85fcea86aa67c0fb9740eb6b51315d194e perl-Unicode-Normalize-1.27-458.module+el8.6.0+879+823e3012.aarch64.rpm f49389c9c65589b71b213a38a7665dc33417100146e82a149bdc2d90bd893c80 perl-Unicode-UCD-0.75-471.module+el8.6.0+879+823e3012.noarch.rpm 2cd8f639f68d91b50850daa0e008220bfb0e5e626df322be161c425a1df794ce perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm 6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0 perl-User-pwent-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm a295ea0d908e6fc919a33297756dba92bce9530192fb5da087ec5ff707744dfe perl-utils-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm ccbd6a719d269e2ebed04ff4b72d49e6ebdc0b36cc25a821803a91147362e8fc perl-vars-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm 7b47dd1b248f8c7c77211a907fb8cc4786d227de025d43ff933faafeb78c348c perl-version-0.99.29-1.module+el8.6.0+879+823e3012.aarch64.rpm a60a3ac501df804e101ad15c6837ae85ac934da4e8088f51c772c50a65c600cc perl-vmsish-1.04-471.module+el8.6.0+879+823e3012.noarch.rpm 7d33e6dd54f850575efe826fe6779d7fe9108f2e28d5e1d5def2640fcc83a814 rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl-libwww-perl perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2 perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1 perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.aarch64.rpm c56e84cd88cc361ec1330518eefa0a8231284c9509fe316f89adb3d6b57baf40 perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459 perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080 perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52 perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309 perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm 321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343 perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6 perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49 perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793 perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911 perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9 perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm 4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.aarch64.rpm abe4bdd7613113545004276a66c641477d976e68067363287c9615113015ab85 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.aarch64.rpm 694fe01ddd1f62d27626b248045ad8991f1535718d99aab40abfc04574707a88 rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLEA-2022:1955 perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-App-cpanminus perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm 66f0ae45e94142b1390878ff07c030503f4634c12c367f50a948bb09aa7c1cc4 perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 1c9b34efc76ec868a389148c9d9ff1b346e4e5cfef0bd1e877224fd7e4d2920c perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm 43853a87a8cdb496e228bbf95ccc517e42d5aee5a80de0ca59c452ca25888703 perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm eacc6ff8a545d15cf72b5635f9664fdafe71a8007c785e29f7425fc361ecd873 perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm 7422068e81de02f874f3bc4f116ac23c053921c9049c37d365cba8303778938a perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm e7cf57076a6be1ad5dd463bd91210038acfe7caf2b8f5a378b672815c6966e0c rocky-linux-8-aarch64-appstream-rpms__perl perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm 85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0 rocky-linux-8-aarch64-appstream-rpms__perl-libwww-perl perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2 perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1 perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.aarch64.rpm c56e84cd88cc361ec1330518eefa0a8231284c9509fe316f89adb3d6b57baf40 perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459 perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080 perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52 perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309 perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm 321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343 perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6 perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49 perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793 perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911 perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9 perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm 4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-MySQL perl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.aarch64.rpm 31ac510c5afe2886591a28cd9f9899c4cfee9a7edd858dbeaa1e6178244deb2d rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 rocky-linux-8-aarch64-appstream-rpms__perl-DBD-SQLite perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.aarch64.rpm 6d8d12676453d9164d547ead974f8885f371ac66d482ade648a723ae710ab464 rocky-linux-8-aarch64-appstream-rpms__perl-DBI perl-DBI-1.641-4.module+el8.6.0+891+677074cb.aarch64.rpm abe4bdd7613113545004276a66c641477d976e68067363287c9615113015ab85 rocky-linux-8-aarch64-appstream-rpms__perl-FCGI perl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.aarch64.rpm 715135240a129337533e45b09fd90ca15ef6cfce3c56286bd9043b7f79bb3414 rocky-linux-8-aarch64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.aarch64.rpm 694fe01ddd1f62d27626b248045ad8991f1535718d99aab40abfc04574707a88 rocky-linux-8-aarch64-appstream-rpms__perl-YAML perl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm bbd5220f0f441c8b9b88fb4623eff976d2a298849b435376081296f06b8f1523 RLBA-2022:1999 trace-cmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trace-cmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms kernelshark-2.7-10.el8.aarch64.rpm 0c298af03787957e513d36f1e1ea210641e20b2fc0bfa471ad3ea4bffa5aecc4 RLBA-2022:2018 perl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms perl-5.26.3-421.el8.aarch64.rpm 824c0509742126bccb119650d61c819062acc45ed9b59ebb846d16db3b92e3cf perl-utils-5.26.3-421.el8.noarch.rpm 7768fb10a59c0e2a7be504351e22ea85fbec0d6ce9e748ab5aa572165643b0fd perl-Attribute-Handlers-0.99-421.el8.noarch.rpm c67e0e8f12e7b46b4d8a3705f0c3ce7b4b01307508b747a3d2ca514f697e9398 perl-devel-5.26.3-421.el8.aarch64.rpm 8e557d3c5d8e287a1826a6e9f40d5a1741b3844d8de4be682ed2ba4ba9716f2c perl-Devel-Peek-1.26-421.el8.aarch64.rpm 5807107d803b80fe4b8fbed19ede982811e62d76b1a70b531691483c0043cb5d perl-Devel-SelfStubber-1.06-421.el8.noarch.rpm 986d78a6c8d9b4ce0698c4d6ea5d66531eacededb54a97f8a8141bc8230fcc89 perl-ExtUtils-Embed-1.34-421.el8.noarch.rpm 677553fb9495d08b815a7044a6347440e7b632b8e9bc38a0b748c8638e9fd0c5 perl-ExtUtils-Miniperl-1.06-421.el8.noarch.rpm f8a43f89f59de3ad61ac2edc52e907b0ac94646c4b49856b89ae5a53ff73507f perl-libnetcfg-5.26.3-421.el8.noarch.rpm 84dc8411cf86bbc8c6afc4ad5059a399b59bffc3d6dc674c8cb5964ba94669f2 perl-Locale-Maketext-Simple-0.21-421.el8.noarch.rpm fd32ddc20e534ba3efddfe29e742948a8c50fea177ad1d017a13d18f9c812a4d perl-Memoize-1.03-421.el8.noarch.rpm c4aecb1934ca89c82001a151bbfeff4a02fadf1c2283e782db864da4fb170e81 perl-Module-Loaded-0.08-421.el8.noarch.rpm b467bb47db2fa4d717ed1f989f7a7d7bccdf8d9ddb52143f310c2483e1a7326e perl-Net-Ping-2.55-421.el8.noarch.rpm 2306c5ea5766ff7683707bae5690371c8f522f84f52e0b17e133632cfd0b2017 perl-open-1.11-421.el8.noarch.rpm 82ed6426b0d0907e3a969c6587ee354731a04f9fd82493b8b51265700f949e60 perl-Pod-Html-1.22.02-421.el8.noarch.rpm b6a508328e8fe486c3863ea2b2e623034b454998e3bea8d038b9f0daaee4e933 perl-SelfLoader-1.23-421.el8.noarch.rpm 04b2901653f194db99e55d4a50a4faca5d925638809eca595fb321155f9d0f1c perl-Test-1.30-421.el8.noarch.rpm 2983dfb3fc40d8d795174749ac3d0d7039e2e5ac9f4213ce041b235f8b7de4c6 perl-tests-5.26.3-421.el8.aarch64.rpm fe8bce1dd17a2c5b6b5a13812792abe279633bcb92a1ca08aa2e0e054056accc perl-Time-Piece-1.31-421.el8.aarch64.rpm 52db9df7c62c01ad7e6190e242bee2086224e508b0c707fb3a54038f464d1bdc RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libssh-devel-0.9.6-3.el8.aarch64.rpm a383836fcadad176e75c7f438f27f3973ca86aa3e9396e0d934aed31d79a9cdf RLBA-2022:2061 jansson bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jansson. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms jansson-devel-2.14-1.el8.aarch64.rpm 245e2f497a4fbe243615b9cb9f073736d374d6df66d4794bf138f62878a276b5 RLBA-2022:2063 firewalld bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms firewall-applet-0.9.3-13.el8.noarch.rpm 9b5d2c6936e1205d6c1451ce75981469aa8c442fc9c1a3e3a21da3099cb737eb firewall-config-0.9.3-13.el8.noarch.rpm b34f79b0b9751e662540afee7e53397f7a2b4c3f7be89befbb7580b497fb3472 RLBA-2022:2079 setools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms setools-4.3.0-3.el8.aarch64.rpm 983b0f3348968eddc146e41b2a2ff8a03a08e2db03c716e37b2f5bda8daeae32 setools-console-analyses-4.3.0-3.el8.aarch64.rpm 3184af8d2dd4b95322c4aaf4017d53e062365ebe9669e97fa66643a3140bb115 setools-gui-4.3.0-3.el8.aarch64.rpm b41cdd0231c523343e41b8979d37e37c3a29a886ddb12ae73c8337dc46bd030a RLBA-2022:2091 postfix bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms postfix-cdb-3.5.8-4.el8.aarch64.rpm 41ef0c5545029ff77bab6b9f0964a41955e2e567ee18c398702405f74b456ad0 postfix-ldap-3.5.8-4.el8.aarch64.rpm 54426ab9de386274146e44da85edf8485028e14b5e89108cfb081458d4fa97f9 postfix-mysql-3.5.8-4.el8.aarch64.rpm 49b02f74c02a889a1ea7064be0396be78839eb51d024e4bf2d54f0b4a5ca432f postfix-pcre-3.5.8-4.el8.aarch64.rpm 17cfee6380a5d8140e1903949e01861629b31720e38ee87ce64ce0ec787135cc postfix-perl-scripts-3.5.8-4.el8.aarch64.rpm c69dfb37cba154e855958e87c75b0ca51a95405b825704943e9dca11cd4be11f postfix-pgsql-3.5.8-4.el8.aarch64.rpm 9fe1fc6e2615c971c3593e689fcc4674d2c024a0cb1605a81cc6de18d5193d03 postfix-sqlite-3.5.8-4.el8.aarch64.rpm 676ea65314e37dd10dc578c594b64f2acd3c2b0e6767016364cd312264cf032d RLBA-2022:2097 cryptsetup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cryptsetup-devel-2.3.7-2.el8.aarch64.rpm 251bab4924f64b30d034499f46e8f3e5f991521c32d6afa308b489a390bf678c RLBA-2022:2099 sysfsutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysfsutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sysfsutils-2.1.0-25.el8.aarch64.rpm c7934b8e0b257dc71690d5ac0511641e996742c2c65fb2038c8334637916e960 RLBA-2022:2117 gpgme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qgpgme-1.13.1-11.el8.aarch64.rpm 39f5712e65395199c671da40f1a21984629562c47f9c741ee27f44fe16e98b3c RLSA-2022:5813 Moderate: vim security update Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms vim-common-8.0.1763-19.el8_6.4.aarch64.rpm 777cad31f268d5c06298ceff7d4cae4f0986f83317f745abb40aff0a6b28c0b9 vim-enhanced-8.0.1763-19.el8_6.4.aarch64.rpm a564678cc0ff9ec5e8b7382aeac1979f859bdc65c91d86eb02d1a530fe61ed3a vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm 37b57ef90a9d794c1f1ef30ca31a1a26a8651d05b752f582dc91f3112a8fb124 vim-X11-8.0.1763-19.el8_6.4.aarch64.rpm 1614513445c6fcd58351fe174afd47daa45e2d16abc8a2f18a8fee5f5bc71dac RLSA-2022:7105 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms gnutls-c++-3.6.16-5.el8_6.aarch64.rpm 34f440a0af33f6180783d4e33e3dee229d18667d347016dd80672efeaebf2c26 gnutls-dane-3.6.16-5.el8_6.aarch64.rpm 39700da413751f9567b32c20fefc28deb51c1f2cf8e5c8ba77b83f89c937f86c gnutls-devel-3.6.16-5.el8_6.aarch64.rpm 7a8b22708af9759ce416f00529363c53da982ed29a855a7008f112335dbd27d4 gnutls-utils-3.6.16-5.el8_6.aarch64.rpm 7baba14edd345a9297bbe05ac0e3650b7512e8b0e96352030e1e6fbb5ca540fd RLSA-2022:7108 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms lemon-3.26.0-16.el8_6.aarch64.rpm bb4319ad5baff52ae9aacf9c49ecf6eebd0da5140a596ce6d46bb9df5dc6fac0 RLBA-2022:7115 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) rocky-linux-8-aarch64-appstream-rpms rpm-build-4.14.3-24.el8_7.aarch64.rpm 1937da41e1193d35ee325dcff39443af1fcb632c2b885fd2b1f804830ff40e6c rpm-plugin-fapolicyd-4.14.3-24.el8_7.aarch64.rpm d0fa795c0bb7d6744420ea7ce6c4e49e486ccd1056c0b4cc645e13b09c963f8e RLBA-2022:7404 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-aarch64-appstream-rpms tzdata-java-2022f-1.el8.noarch.rpm 0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984 RLBA-2022:7684 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms compat-libpthread-nonshared-2.28-211.el8.aarch64.rpm 238ea16a4efbbf5e4b6f62a06c6537974f2f7ea9c511a069076d0c54563e88e9 glibc-utils-2.28-211.el8.aarch64.rpm 4c8441c7bb601093e2b75bb79617f45cf97a16bb0619e6c05704c2d2e31f0f76 RLBA-2022:7688 gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cpp-8.5.0-15.el8.aarch64.rpm 30e01daed5d6c8e61152f4da6a9e60291bfcfdd96c4cf9e0e2c2ebfbc14a5f58 gcc-8.5.0-15.el8.aarch64.rpm f7b24b82577b969243af6fb8635ed321a28e06477a151eaf61262f48cc6ce931 gcc-c++-8.5.0-15.el8.aarch64.rpm a27c635598f3eb9826fba87641e8f9839e5690637ade770b3caf9e10d558fd5d gcc-gdb-plugin-8.5.0-15.el8.aarch64.rpm 9e681f3095d0538585c08ebbf11c70a36ca4f3800e57c4fc015babd3c36cb1de gcc-gfortran-8.5.0-15.el8.aarch64.rpm 3b9441380f185c85720a68e52b8a545a81c0e4315bfb95b1bab1c9494356141c gcc-plugin-annobin-8.5.0-15.el8.aarch64.rpm 40ab85ccf76f9f3ea71c9023c5d864b674a3df32f3ed0a1e822b1b40bca4a40c libitm-devel-8.5.0-15.el8.aarch64.rpm 19409dbe98a683fcd7461d82fcf0ebcfcb7689a1bff6d094576c2e33c29d9004 libstdc++-devel-8.5.0-15.el8.aarch64.rpm 66881f734feb109af326fe0ccb273bf72eec9e996e8f5a1d3df227a3071efda2 libstdc++-docs-8.5.0-15.el8.aarch64.rpm aab31c0399675a066dec655d8ac17a917015f848a8b1b7f5bf724a4fb1b9b898 RLBA-2022:7693 binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms binutils-devel-2.30-117.el8.aarch64.rpm 94526ab2282b0224a3625ec8df44dfb9a649540d773ba1fb2685c0dac6dd9aa0 RLBA-2022:7698 samba bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms samba-vfs-iouring-4.16.4-2.el8.aarch64.rpm ed5de3fefe0945ab399775654bfadfd2fc7c1e0dd390b9bf6bc3bb2b831f328a RLSA-2022:7715 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libxml2-devel-2.9.7-15.el8.aarch64.rpm f81bc790de366883f2a103246ec824b148276ec41c4ddf49ff5e5256c12915fa RLBA-2022:7716 cups bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cups-2.2.6-50.el8.aarch64.rpm 7c7f84973ad129f63fc2f18e582ed539e76d6c251d0a27eea9125dcf9975bfd1 cups-client-2.2.6-50.el8.aarch64.rpm dfdcba530345c9dd49e8d4297f2f1b100ab809faa315a797e107e4e696f5dee2 cups-devel-2.2.6-50.el8.aarch64.rpm 2183bcc70ed7b457d0cf57196084999dabb7ce611548a9a3fe1b16b510df1122 cups-filesystem-2.2.6-50.el8.noarch.rpm 340365e14e5c67134cd42391206678c6578cb011ab2cd816777e07e178b1649f cups-ipptool-2.2.6-50.el8.aarch64.rpm bdccfb116603c061470d9ca89f10a6d094ca2f059d436cb48ec7dc068334ffdd cups-lpd-2.2.6-50.el8.aarch64.rpm 121c1b80885810ad5fb13584b77ff4153064efa82fd988b7bc0f3d8cc71f45cf RLEA-2022:7719 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms subscription-manager-migration-1.28.32-1.el8.aarch64.rpm 15acdd78337c7971f8a4e4eef135b2e7bc0bd6cb6b6a9abe127c0c4039a0c3cc RLBA-2022:7735 bluez bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bluez-cups-5.63-1.el8.aarch64.rpm b9d80281d99e55bf0ab8c54b94d3aa83e40f183e9ae62b3f2d6ca41d5fba36d9 RLBA-2022:7738 authselect bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms authselect-compat-1.2.5-1.el8.aarch64.rpm 41d1864f2f372b30aa53e5651c1935a4d5dd10e83b9b95177c1b515677c85ef4 RLBA-2022:7746 zsh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms zsh-html-5.5.1-10.el8.noarch.rpm 1a856e07e467122c9383f89a0c778a983d8b82bc138e522bc5b266ff76ec019c RLBA-2022:7747 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tuned-gtk-2.19.0-1.el8.noarch.rpm 47f13bd39952a7079fa357c764f075d8dc0635b4e5314859b6fbcc030468b260 tuned-profiles-postgresql-2.19.0-1.el8.noarch.rpm 47bdfe6837d32422eb6071db284c1427dbd9d24572f5e010b4e16f91c1677479 tuned-utils-2.19.0-1.el8.noarch.rpm 0bde2847749a3bcaabec1e04b32b81ef170d9e02238bb8c65032d365be8fa8b0 tuned-utils-systemtap-2.19.0-1.el8.noarch.rpm b2ab705b2debee9ea11b6dd6a7a1e1096c5b251007dbd48f0e7eb2b415ebcbe2 RLBA-2022:7759 dnf-plugins-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-dnf-plugin-modulesync-4.0.21-14.1.el8.noarch.rpm 7068f370d1b9133196d186276c7ca4139bc68f2235287a12df8215f48018e72c RLBA-2022:7763 openssh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms openssh-askpass-8.0p1-16.el8.aarch64.rpm b23e3cb2f1d763b7d87be720e9d0e9aee498e5c8eb7de5ae7577c109d00a32f8 RLBA-2022:7769 dbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dbus-devel-1.12.8-23.el8.aarch64.rpm 4e3518c1a81f04d4f9a4e3f96ccbc48188d5d5b5efb60ce249a416d2c7fb2741 dbus-x11-1.12.8-23.el8.aarch64.rpm 6111d4060f3006e0776dcc2ea329ee0714c94ed46b9ad073871de97466820af1 RLBA-2022:7774 sanlock bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-sanlock-3.8.4-4.el8.aarch64.rpm 14f9122b9bca1b6f712154d2d791348bc37481a09d5cb3258a3f136e7a434868 sanlk-reset-3.8.4-4.el8.aarch64.rpm de21fb324c3930a9760852d3acaed3999c3439b6ce2e25eb6dd5faabab57e89a sanlock-3.8.4-4.el8.aarch64.rpm 410072315117b76dc0cb1d086d909bfdb82c6a270208a3c48d6dd24e40243aa7 RLBA-2022:7776 libverto bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libverto. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libverto-libev-0.3.2-2.el8.aarch64.rpm 1945bfbf5b952cbccb62318a0340b132c58a69d3d7753c71b55bdc0cc3e9819d RLBA-2022:7783 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-libmount-2.32.1-38.el8.aarch64.rpm 907c8618631c0016abcf711689fc57c87e965cd75290f0eb04ffc69924a80c6a RLBA-2022:7786 libselinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libselinux-ruby-2.9-6.el8.aarch64.rpm f10501b77d26e68812ea74fd5b18cf0bb35cd5074a91632b74de266010d0658e RLEA-2022:7797 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fabtests-1.15.1-1.el8.aarch64.rpm 4f98fac490b4399a272618678f104b17930f287221697398987fa6fec4cd6096 libvma-9.6.4-1.el8.aarch64.rpm 9eb3bebfeeef87dc750e3f50d98ca29110951b83fb2c7fc40b9219d3340ca41d mstflint-4.21.0-1.el8.aarch64.rpm 41d7de6194f700dc0fec823c8296aa9ba237f30759993d0334e49058d3877916 ucx-1.13.0-1.el8.aarch64.rpm 2c953102665c5efb6278aa05dfd62eb0d7e2b9d1b7cc3240f3967de0a5055693 ucx-cma-1.13.0-1.el8.aarch64.rpm 4d3c54e5ed2234c91027ee7fd99dbce3bf0b3d730253153690a2e1cddb2a5640 ucx-devel-1.13.0-1.el8.aarch64.rpm 7d9a20579339af6aa5853855ac520811f91684cb374273e48347ba1f7b206a8f ucx-ib-1.13.0-1.el8.aarch64.rpm ace1ebac6a213bf3b9c8c3ff0d83ab24f3412d16e9c9f9700708fa7b11199187 ucx-rdmacm-1.13.0-1.el8.aarch64.rpm 7c565e0f78188570c397fdc0122bce43a37f08a94f27bf9fbc3ac924bb037984 RLBA-2022:7805 policycoreutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms policycoreutils-gui-2.9-20.el8.noarch.rpm 1d99560135850829f9dc0fb2b77885c934580993648eb3a8b42ab244522d4c70 policycoreutils-sandbox-2.9-20.el8.aarch64.rpm 9726c0846d0f38131e7631251cf12868d7afb18a5dcba37de2031b23ae061a3e RLBA-2022:7819 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) rocky-linux-8-aarch64-appstream-rpms rpm-build-4.14.3-24.el8_7.aarch64.rpm 1937da41e1193d35ee325dcff39443af1fcb632c2b885fd2b1f804830ff40e6c rpm-plugin-fapolicyd-4.14.3-24.el8_7.aarch64.rpm d0fa795c0bb7d6744420ea7ce6c4e49e486ccd1056c0b4cc645e13b09c963f8e RLBA-2022:7825 bind bug fix and enhancement update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) rocky-linux-8-aarch64-appstream-rpms bind-9.11.36-5.el8_7.2.aarch64.rpm 0ef9654849167ae87d46cc836e88b34e84f75aa497573ad9f64d033a762e1355 bind-chroot-9.11.36-5.el8_7.2.aarch64.rpm dbd49c2dc45013724f72a0c4ca1b01d40f025de37a5625bdaf7f5a4f005844fd bind-devel-9.11.36-5.el8_7.2.aarch64.rpm f75106e899c43b74b71645b26f5966ddf8044860dc52c726d62251c392465718 bind-libs-9.11.36-5.el8_7.2.aarch64.rpm ecbecb2b28fab33dded8d309cbc490a00fae8d80b488abb6c99676a99cd89776 bind-libs-lite-9.11.36-5.el8_7.2.aarch64.rpm ef1cd6dc99d5de6f8a342af03b52bef4d7ab280d27c42a8063b4bd254153d117 bind-license-9.11.36-5.el8_7.2.noarch.rpm 6962b9370b7289b60f13dd744a4686cc326e572e0d78146d05bb2d185cc25609 bind-lite-devel-9.11.36-5.el8_7.2.aarch64.rpm 6a60bb607e7938b520e10dc5ac29e90e71144f5df229d129729d06a91a54c6ac bind-pkcs11-9.11.36-5.el8_7.2.aarch64.rpm 698aa3f3807f10ed387e6c46342687d7929e56cc9074ef6b55f3dadad692b7a4 bind-pkcs11-devel-9.11.36-5.el8_7.2.aarch64.rpm 9195e5682cf29647e22a7f57ab21f06f1ace0980870795bb82e1e292513feeed bind-pkcs11-libs-9.11.36-5.el8_7.2.aarch64.rpm e9582097364962f1292dac756e34bc8131351c5a5ed2146a0622597d99f051dc bind-pkcs11-utils-9.11.36-5.el8_7.2.aarch64.rpm d12f2e391d1583676a8ed0efd70608ef720ed8140e5fcd6acfb83e4a7cf72da7 bind-sdb-9.11.36-5.el8_7.2.aarch64.rpm 9edd6ab36f83a2201b1257c53adacc791810dd61db3cab72139156a52536db68 bind-sdb-chroot-9.11.36-5.el8_7.2.aarch64.rpm 51ccd4f03e8bade01036fe5c5a4c88f5a9a580c4d12887dcaff78c1d6f4c2603 bind-utils-9.11.36-5.el8_7.2.aarch64.rpm a214e111d5501a66f2a3519884f6056a69bcbee8dac6088da904094d95ea1d65 python3-bind-9.11.36-5.el8_7.2.noarch.rpm b218709131629d02a30d045c0bcf541ee2262bbd083d07b35e263675fce0703e RLBA-2022:7828 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) rocky-linux-8-aarch64-appstream-rpms NetworkManager-cloud-setup-1.40.0-2.el8_7.aarch64.rpm f46ea8b0abbb37387fbc80bca560d43a8c6445b1ff7d2957396121aa0353c7ce RLBA-2022:7829 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) rocky-linux-8-aarch64-appstream-rpms sssd-idp-2.7.3-4.el8_7.1.aarch64.rpm f18f0a8f592c6b5244a370461dbb582d702835409b6b56b40d310217938d6531 RLBA-2022:7884 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-aarch64-appstream-rpms tzdata-java-2022f-1.el8.noarch.rpm 0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984 RLBA-2022:8785 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. rocky-linux-8-aarch64-appstream-rpms tzdata-java-2022g-1.el8.noarch.rpm d5799859d5ae6af11f34b5c55e385e2f26daa17a9b635a9a9446f134e31d707d RLBA-2023:0085 net-snmp bug fix and enhancement update The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) rocky-linux-8-aarch64-appstream-rpms net-snmp-5.8-25.el8_7.1.aarch64.rpm e2544ebc4852aec4d6e68afe5b8b3ee4c98cd18906a9d55985399c3948ea853a net-snmp-agent-libs-5.8-25.el8_7.1.aarch64.rpm 1864ac762a7cc4a6aebb9243907712c2a83fb4b038b73ade7a190c0dd6eb3c93 net-snmp-devel-5.8-25.el8_7.1.aarch64.rpm 5a3e431ab06595c787853a1eed1c02efce6bdaf25dce90712365fb46fc864b1d net-snmp-perl-5.8-25.el8_7.1.aarch64.rpm 9ba458267865b0124e227c3ba1d33e8f0eba62bdd96cabfc9795f5991cf52b8e net-snmp-utils-5.8-25.el8_7.1.aarch64.rpm 42f271a989c1822450733d4cea6622c1ea1a1302848bb631a0df01eb920593d6 RLSA-2023:0096 Moderate: dbus security update D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms dbus-devel-1.12.8-23.el8_7.1.aarch64.rpm f812254a2661158ae7718d624716c015ba398464aba5f270a9a642c45375b36b dbus-x11-1.12.8-23.el8_7.1.aarch64.rpm efcf18a9d744177c38d9af5af290bba24f13c90fa201660fbdd11551882de0e4 RLBA-2023:0098 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) rocky-linux-8-aarch64-appstream-rpms NetworkManager-cloud-setup-1.40.0-5.el8_7.aarch64.rpm 12a5d3802ebd41d07f1956f0a77517770fe742f1bb1a1e1eb7fb2df1aa2698ad RLBA-2023:0105 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) rocky-linux-8-aarch64-appstream-rpms python3-libmount-2.32.1-39.el8_7.aarch64.rpm ead00105efc8669822e3a22027fee52306710c56633e6dfa44a3dd9568ac8e3e RLBA-2023:0106 gcc bug fix and enhancement update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) rocky-linux-8-aarch64-appstream-rpms cpp-8.5.0-16.el8_7.aarch64.rpm 424575cc10147ad5473e5ce4b4208da55602c88abdee797c65132be5ad7b50c0 gcc-8.5.0-16.el8_7.aarch64.rpm 7414513266f1c74d11b35f1925956924b0d89a6f2212ba5095d09a50d8c777aa gcc-c++-8.5.0-16.el8_7.aarch64.rpm 9933e6f1bc522781b93e1e2f85225ff13cd233a388cc5319ceb2c38ad8f79d88 gcc-gdb-plugin-8.5.0-16.el8_7.aarch64.rpm 0b53a9377af5f9a446da4c6ce9ad89ce198a47a32e53ad0641494a8ad15bcfdc gcc-gfortran-8.5.0-16.el8_7.aarch64.rpm 3bc348e0b1a20d1acdb0267211061665269c1dd4f5dad2ae749b28fea3566d04 gcc-plugin-annobin-8.5.0-16.el8_7.aarch64.rpm 0c2e0718d746118930f21af436d13798e458c77d882c627ff62f69516aaa895c libitm-devel-8.5.0-16.el8_7.aarch64.rpm 1d04076a26e26f6f171656f5f43194378d7d8e8cf5161574765ea4ee42642514 libstdc++-devel-8.5.0-16.el8_7.aarch64.rpm 7301fa108760c4ead9d8cd2b9da7743a38c92dd7a0e93cc4e9e6c861312f0737 libstdc++-docs-8.5.0-16.el8_7.aarch64.rpm 4e6a3df109acb93be7c52b21ba0413257284205ef35ad999e6b48a7b3df0eb87 RLSA-2023:0110 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms lemon-3.26.0-17.el8_7.aarch64.rpm 599b410d839e48e7119a9424694039a4e68ef25b7de4ee1913473855f7f90bf5 RLSA-2023:0116 Moderate: libtasn1 security update A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libtasn1-devel-4.13-4.el8_7.aarch64.rpm 24f80ad1744fdb61e9ad5f327dd9f2a0f9fd218bb00710383b9a21ec2412bbf6 libtasn1-tools-4.13-4.el8_7.aarch64.rpm ebdaf2f25c16150a48847270d752e9e8f5c3ac1ab5b89d69c77c067b93b0f962 RLBA-2023:0120 authselect bug fix and enhancement update The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) rocky-linux-8-aarch64-appstream-rpms authselect-compat-1.2.5-2.el8_7.aarch64.rpm 2b3ff55e670cfc29000e7ae5f4411375e73af1b5c7fe010e20ba59270ad092d8 RLBA-2023:0124 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) rocky-linux-8-aarch64-appstream-rpms sssd-idp-2.7.3-4.el8_7.3.aarch64.rpm 1812c483f6c3b9d41c728368ebd65c3e929cac3a5c8774618cf2835f07c2ad8a RLSA-2023:0173 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libxml2-devel-2.9.7-15.el8_7.1.aarch64.rpm 76668da079a62a262935bd1ff5c7c7cc968c1b414f24f84599ac41eceee5b5fb RLBA-2019:0973 container-tools bug fix update The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc. Users of container-tools are advised to upgrade to this updated package, which fixes several bugs. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools package contains tools for working with containers, notably podman, buildah, skopeo, and runc. Users of container-tools are advised to upgrade to this updated package, which fixes several bugs. rocky-linux-8-aarch64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLSA-2019:0975 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675) * [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669) * [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * A flaw was found in the way runc handled system file descriptors when running containers. A malicious container could use this flaw to overwrite contents of the runc binary and consequently run arbitrary commands on the container host system. (CVE-2019-5736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [stream Rocky Linux8] rebase container-selinux to 2.94 (BZ#1693675) * [stream Rocky Linux8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installed (BZ#1695669) * [stream Rocky Linux8] don't allow a container to connect to random services (BZ#1695689) rocky-linux-8-aarch64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLSA-2019:0981 Important: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636) * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLSA-2019:0984 Moderate: python36:3.6 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-nose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. Security Fix(es): * python-sqlalchemy: SQL Injection when the order_by parameter can be controlled (CVE-2019-7164) * python-sqlalchemy: SQL Injection when the group_by parameter can be controlled (CVE-2019-7548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__python36 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 RLBA-2019:0986 rhn-tools:1.0 bug fix update Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. Bug Fix(es): * Cannot provision PPC64LE Rocky Linux8 host: grubby-bls: the option "--yaboot" was deprecated (BZ#1702181) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-koan, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler, spacewalk-remote-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. Bug Fix(es): * Cannot provision PPC64LE Rocky Linux8 host: grubby-bls: the option "--yaboot" was deprecated (BZ#1702181) rocky-linux-8-aarch64-appstream-rpms__rhn-tools koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5 osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105 python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7 python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6 python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66 python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544 python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554 python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47 python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266 python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0 python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm 81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b python3-spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm f17dbf0ff52ef317f7d9b48d61fd61d97afce69cab09fa39e3bf71042cb791ba python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm 87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858 python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm 7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55 rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9 rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm 1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3 rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444 spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226 spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm dbfd4518fff5db07595559409fffb9d203a4dcc50aaddf0a9e1c5e15ede11720 spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354 spacewalk-remote-utils-2.8.4-5.module+el8.3.0+252+a4420673.noarch.rpm 2fead60abcda5cce898895895cc0105fe97c7e0496cd6ae63be8e03a48852dd1 spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959 RLBA-2019:0987 mariadb:10.3 bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Bug Fix(es): * Altering table's column used in primary key causes data corruption (BZ#1702602) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Bug Fix(es): * Altering table's column used in primary key causes data corruption (BZ#1702602) rocky-linux-8-aarch64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a RLBA-2019:1524 rhn-tools:1.0 bug fix update Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. This update fixes the following bug: There was a problem that was caused by a missing tar command for the system provisioning script (BZ#1703706). Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Network Tools provide programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Network and Rocky Enterprise Software Foundation Network Satellite. The spacewalk-remote-utils package contains the spacewalk-create-channel utility that can be used to create channels with a package set for a particular release. This update fixes the following bug: There was a problem that was caused by a missing tar command for the system provisioning script (BZ#1703706). rocky-linux-8-aarch64-appstream-rpms__rhn-tools koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5 osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105 python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7 python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6 python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66 python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544 python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554 python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47 python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266 python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0 python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm 81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm 87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858 python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm 7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55 rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9 rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm 1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3 rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444 spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226 spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354 spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959 RLSA-2019:1529 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLBA-2019:1970 authd bug fix update The authd packages contain authd, a small and fast RFC 1413 ident protocol daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd. Bug Fix(es): * authd authentication fails with ERROR:NO-USER (BZ#1730802) Users of authd are advised to upgrade to this updated package, which fixes this bug. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authd packages contain authd, a small and fast RFC 1413 ident protocol daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd. Bug Fix(es): * authd authentication fails with ERROR:NO-USER (BZ#1730802) Users of authd are advised to upgrade to this updated package, which fixes this bug. rocky-linux-8-aarch64-appstream-rpms authd-1.4.4-5.el8_0.1.aarch64.rpm e89442bead3af9dd8d9aa619b9acef02b9233e652301bc9dfe8d3bdb7c54461e RLSA-2019:1972 Important: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.aarch64.rpm d6e83db1ed53961b708866292cbcde971a111734e3b552032fcb204101e1dfdc rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLBA-2019:1954 python27:2.7 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714757) rocky-linux-8-aarch64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLBA-2019:1955 satellite-5-client module update Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) rocky-linux-8-aarch64-appstream-rpms__satellite-5-client dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm c738f38ce26ddcc540a4b59a1d0c2c133be8f2391b0526185a64142906a30a82 python3-dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm 65996b41301af857a541928e6ab60fe6ab556f582566dc8cdec0d42284ec7cc4 python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 67499d94062084d550fb6ef21d701fb0b9c4af63d6ed314e6c4bae124a9c5c27 python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm d89ef303c00aed2120d4f2d274e1d69930762f72fde62f553326cd760bfb26ce python3-rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm 4ea6368bf1b879bdeb7927df0cc66a74c94e25f918ff7eb7bcac25a8413543e2 python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 0d41cc9b6c41f2e3708378a9fda0245c711fed97997ae86e8ba4c8533fd105cb python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm f19d7e2b24a1832d9248c6d94faf6a82d7cf1c950625dfbcc596926df5ca2ccc rhn-check-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm a38fe93090bed18cda9cd09eab9f751bbe097a1a75a47f76ca9fc26698f8c6e5 rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 78b0cc98ca75af7df3805dc20e4c77f8aad65c1eb911a7150158d1b8c21c46d7 rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm b71d82c660d0b4b0da5eb8e25137387c4a9376ff7d17f53ab57c7b87b6679eb8 rhnsd-5.0.35-3.module+el8.3.0+178+27415451.aarch64.rpm 309543de06645b42e83f87472cd49b87e25fa32f755363e12072e8fdf3c54bbf rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm eb658310ccc72119eb2f50e7a9b8015103c764917db74e2170fbea72471f71ef rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 29a561abeb77109f7be2a19154e429ef4a36c162f1e3b86ed9ac9d79b1309e6e RLBA-2019:1956 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470) * Performance Problems with Podman on systems with IO load (BZ#1724522) * podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec rc-code needs to distinguish between stopped containers and non existing ones (BZ#1723470) * Performance Problems with Podman on systems with IO load (BZ#1724522) * podman exec leaks an exec_pid_<hash> file for every exec in tmpfs (BZ#1731270) rocky-linux-8-aarch64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLSA-2019:2511 Important: mysql:8.0 security update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a later upstream version: mysql (8.0.17). Security Fix(es): * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503) * mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752) * mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536) * mysql: Server: Connection unspecified vulnerability (CVE-2019-2539) * mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737) * mysql: Server: XML unspecified vulnerability (CVE-2019-2740) * mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780) * mysql: Server: DML unspecified vulnerability (CVE-2019-2784) * mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795) * mysql: Client programs unspecified vulnerability (CVE-2019-2797) * mysql: Server: FTS unspecified vulnerability (CVE-2019-2801) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819) * mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mecab-ipadic, mecab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a later upstream version: mysql (8.0.17). Security Fix(es): * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2800, CVE-2019-2436, CVE-2019-2531, CVE-2019-2534, CVE-2019-2614, CVE-2019-2617, CVE-2019-2630, CVE-2019-2634, CVE-2019-2635, CVE-2019-2755) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2420, CVE-2019-2481, CVE-2019-2507, CVE-2019-2529, CVE-2019-2530, CVE-2019-2581, CVE-2019-2596, CVE-2019-2607, CVE-2019-2625, CVE-2019-2681, CVE-2019-2685, CVE-2019-2686, CVE-2019-2687, CVE-2019-2688, CVE-2019-2689, CVE-2019-2693, CVE-2019-2694, CVE-2019-2695, CVE-2019-2757, CVE-2019-2774, CVE-2019-2796, CVE-2019-2802, CVE-2019-2803, CVE-2019-2808, CVE-2019-2810, CVE-2019-2812, CVE-2019-2815, CVE-2019-2830, CVE-2019-2834) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-2434, CVE-2019-2455, CVE-2019-2805) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2482, CVE-2019-2592) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2019-2486, CVE-2019-2532, CVE-2019-2533, CVE-2019-2584, CVE-2019-2589, CVE-2019-2606, CVE-2019-2620, CVE-2019-2627, CVE-2019-2739, CVE-2019-2778, CVE-2019-2811, CVE-2019-2789) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2494, CVE-2019-2495, CVE-2019-2537, CVE-2019-2626, CVE-2019-2644) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2502, CVE-2019-2510, CVE-2019-2580, CVE-2019-2585, CVE-2019-2593, CVE-2019-2624, CVE-2019-2628, CVE-2019-2758, CVE-2019-2785, CVE-2019-2798, CVE-2019-2879, CVE-2019-2814) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2019-2503) * mysql: Server: Partition multiple unspecified vulnerabilities (CVE-2019-2528, CVE-2019-2587) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2019-2535, CVE-2019-2623, CVE-2019-2683, CVE-2019-2752) * mysql: Server: Packaging unspecified vulnerability (CVE-2019-2536) * mysql: Server: Connection unspecified vulnerability (CVE-2019-2539) * mysql: Server: Information Schema unspecified vulnerability (CVE-2019-2631) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2019-2636) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2019-2691, CVE-2019-2826) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2019-2737) * mysql: Server: XML unspecified vulnerability (CVE-2019-2740) * mysql: Server: Components / Services unspecified vulnerability (CVE-2019-2780) * mysql: Server: DML unspecified vulnerability (CVE-2019-2784) * mysql: Server: Charsets unspecified vulnerability (CVE-2019-2795) * mysql: Client programs unspecified vulnerability (CVE-2019-2797) * mysql: Server: FTS unspecified vulnerability (CVE-2019-2801) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2019-2819) * mysql: Server: Compiling unspecified vulnerability (CVE-2019-2738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm e7df893453d68958b2697ccbcb1752533f83e53f24a3d7126ed452d0bf645c6a mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm 0ac811884f2cc859f907f1c6272ee524ba31b137b1c05848e2ec91c2f65aefbf RLSA-2019:2512 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS (CVE-2019-0203) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 RLSA-2019:2593 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: heap-based buffer overflow in HttpHeader::getAuth (CVE-2019-12527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLBA-2019:2716 python36:3.6 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732325) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-nose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732325) rocky-linux-8-aarch64-appstream-rpms__python36 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 RLBA-2019:2717 python27:2.7 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732326) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, babel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bux Fix(es): * python-wheel needs to remove or disable their crypto implementation (BZ#1732326) rocky-linux-8-aarch64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLSA-2019:2720 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLSA-2019:2722 Low: libwmf security update The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libwmf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libwmf-0.2.9-8.el8_0.aarch64.rpm 679f80108b6a6c3f048dd58bac66a9f3f485f5c7dbe982a87b5ce572347d5b92 libwmf-lite-0.2.9-8.el8_0.aarch64.rpm 98fd0b5178eb1538f3c7c4b291a5dc0b98e887a6a92e9462eac45f8a73b68e68 RLBA-2019:2723 container-tools:rhel8 bug fix update Bug Fix(es): * race/corruption: podman failed to launch containers (BZ#1741110) * podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * race/corruption: podman failed to launch containers (BZ#1741110) * podman exec can fail with "failed to write ... to cgroup.procs invalid argument" (BZ#1743163) rocky-linux-8-aarch64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLBA-2019:2724 container-tools:1.0 bug fix update Bug Fix(es): * [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * [stream 1.0] need to revert fuse-overlayfs commit to sync with Rocky Linux8 stream (BZ#1720707) rocky-linux-8-aarch64-appstream-rpms__container-tools fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLSA-2019:2799 Important: nginx:1.14 security update Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage. Security Fix(es): * HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 (Post Office Protocol 3) and IMAP protocols, with a focus on high concurrency, performance and low memory usage. Security Fix(es): * HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nginx nginx-1.14.1-9.module+el8.4.0+542+81547229.aarch64.rpm ece45c244e99ad38b09bec6a1ca55d1eb8d2ad3a2f7ff8abbc70a1130415b774 nginx-all-modules-1.14.1-9.module+el8.4.0+542+81547229.noarch.rpm eb20aa61d586dcb30576b6859546e0b777311d2748379db94f9006592eb2a437 nginx-filesystem-1.14.1-9.module+el8.4.0+542+81547229.noarch.rpm 734955ee4e9cc7dd8e87ae6c6cfb3c5bcc3e437d89b3ee82334127ddf27b1d49 nginx-mod-http-image-filter-1.14.1-9.module+el8.4.0+542+81547229.aarch64.rpm ed293e643a5cf031013a0811da390cc51cc4913bb00681d74baab556d856ff83 nginx-mod-http-perl-1.14.1-9.module+el8.4.0+542+81547229.aarch64.rpm cb2d7907ee2808ab6152819589a8d3ab46118c4f8c01ec99795e21119c59263f nginx-mod-http-xslt-filter-1.14.1-9.module+el8.4.0+542+81547229.aarch64.rpm 97559c725e05aa2d4d484c71f0451e68e8f07ced8f66ea015d7f9f5308884115 nginx-mod-mail-1.14.1-9.module+el8.4.0+542+81547229.aarch64.rpm b5ab215341829d122cd61d408cd3b160cc901991ca6391ffdba3b05181726d0a nginx-mod-stream-1.14.1-9.module+el8.4.0+542+81547229.aarch64.rpm 88346d95c7dee3602f8c946dd54568fb91b742ecbf4503a1a24d9e7455eb219f RLSA-2019:2925 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.16.3). Security Fix(es): * HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) * HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516) * HTTP/2: request for large response leads to denial of service (CVE-2019-9517) * HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.16.3). Security Fix(es): * HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511) * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) * HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516) * HTTP/2: request for large response leads to denial of service (CVE-2019-9517) * HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2019:3331 perl-generators bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-generators. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms perl-generators-1.10-9.el8.noarch.rpm fd3bb64efcd24efd5d404cd8ea31bdf335f382cf2a77811750f841b690a48fc4 RLSA-2019:3335 Moderate: python27:2.7 security and bug fix update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution (CVE-2019-6446) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLBA-2019:3336 nss-altfiles bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nss-altfiles. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nss-altfiles-2.18.1-12.el8.aarch64.rpm 3b5c979e8d4acd14988f0e474afd4f30457d0568d94aed4016fb38bfbc080a17 RLBA-2019:3343 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python36 python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 RLSA-2019:3345 Low: virt:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755) * QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2019:3348 idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLBA-2019:3355 rhn-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osad, spacewalk-abrt, rhn-custom-info, rhncfg, spacewalk-koan, spacewalk-oscap, spacewalk-backend, rhn-virtualization, spacewalk-usix, rhnpush, spacewalk-client-cert, cobbler, spacewalk-remote-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__rhn-tools koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm ef6a6abd5a24a20830e6a532506c6325391ef0cba9d5921b87ea468215214fe5 osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 2133db14f204ca048a15cfcb20b148b8d5f73c6275072c959545195e63ec0105 python3-koan-2.0.7.1-6.module+el8.3.0+252+a4420673.noarch.rpm a0ce2d95b51241c2167ddbee03fca8b5d3ce76deb8c45482aa970a49305e1ebe python3-osa-common-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm cd02043d059cb29919b7fb2f2464d388bff93d93adcf7ddf24e24453a4e8e40f python3-osad-5.11.99-8.module+el8.3.0+252+a4420673.noarch.rpm 6a9074192b7c122b476fa15d474961604260fdec74cca10502cc41321384d8a7 python3-rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 993f6be05e14a31109e8dda51488579cff948a3675e7456266c016e43560f4b6 python3-rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 72850cebd3ee25af5b34c3c7b16e9560d178ce1352d28c73519303434ae76b66 python3-rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 1e1f7c96bc40a2e005d06247d6417ffe44563f06859f59a48cae629ca4893544 python3-rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 9e19116ea8766b48317a9c8d20058530345b3d814ed222c81f0da6de1cf50554 python3-rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 104a20afd1759671beb597de2dca516301151e57ee15053f7aa9e9d631b3eccc python3-rhn-virtualization-common-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 59e9f5e5a42a345e883e1f24d44ba4374d4318f88cdd52ccf41d628311c1fe47 python3-rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm 9d4d2782acf243b6f5dec466200f12797c0ea21854a89ee4cee3f8dbb205a266 python3-spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 13f25bdb91b8e5f474c8a85d4799cf02048d64f74c7af73ec099f30d82b064b0 python3-spacewalk-backend-libs-2.8.48-4.module+el8.3.0+252+a4420673.noarch.rpm 81fa5ec16047238ca83e846515d64888a26aeca598f3c7ffea7e538f882b8c4b python3-spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm f17dbf0ff52ef317f7d9b48d61fd61d97afce69cab09fa39e3bf71042cb791ba python3-spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm 87030b53537711a41fdc570ff7fce2f67027417f043d616652ccbba6258cd858 python3-spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm 7de8880e395f8bc88ae6b250654293fdbb43ba5ccd5276d4f3477ae47c70e13a rhncfg-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 3502c4651d93969e0d98a563e60277e1ac9accb3ea506f8368a87c9320e8596b rhncfg-actions-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 6a761d9a856fba39dd1eb646c1ad24d9b5da6c093d42ed03c45e73a00f66035e rhncfg-client-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm f170cbf71b957bb4f71168849ce869c0a570c18c8ad487196c50b80fe07e9e55 rhncfg-management-5.10.120-10.module+el8.3.0+252+a4420673.noarch.rpm 00e597136de3c22b598803c6a00901193c6590c261ecf7b57d8c4953353315d9 rhn-custom-info-5.4.42-4.module+el8.3.0+252+a4420673.noarch.rpm 1e2c7e789b48516f62d6a8b98b7316a655f35207cc6e792bf28cd23fcc8c52a3 rhnpush-5.5.110-6.module+el8.3.0+252+a4420673.noarch.rpm 6f3e46bb12ae2aa9fc3b5083e8d4706510effb90e07dfa87c852b0086d06a6cf rhn-virtualization-host-5.4.70-4.module+el8.3.0+252+a4420673.noarch.rpm e72d2685a7f8a7b786918b618d98ff743332a07137d079e0d2d12ecf86431444 spacewalk-abrt-2.8.3-5.module+el8.3.0+252+a4420673.noarch.rpm 39b418c006dd634bc6433e787323bbc39099af1aa152447952e96000be3e3226 spacewalk-client-cert-2.8.2-3.module+el8.3.0+252+a4420673.noarch.rpm b8628a7c0b5a8ff78e442b97ef471d3ff75868232aaa1d8e11b04f80d4706a4d spacewalk-koan-2.8.6-6.module+el8.3.0+252+a4420673.noarch.rpm dbfd4518fff5db07595559409fffb9d203a4dcc50aaddf0a9e1c5e15ede11720 spacewalk-oscap-2.8.5-4.module+el8.3.0+252+a4420673.noarch.rpm dbe62414978cb5a33feaf68b24d3f90a8378b7eb6c8d4438ee8119d702e58354 spacewalk-remote-utils-2.8.4-5.module+el8.3.0+252+a4420673.noarch.rpm 2fead60abcda5cce898895895cc0105fe97c7e0496cd6ae63be8e03a48852dd1 spacewalk-usix-2.8.1-5.module+el8.3.0+252+a4420673.noarch.rpm f254208706acce7b4bc22289c9c5adc4cda822dbb62e7e1f1260be6848c1c959 RLEA-2019:3367 google-noto-cjk-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-cjk-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms google-noto-cjk-fonts-common-20190416-1.el8.noarch.rpm 05c71f569e9d099ae44beb99756dd24bdf1b11477afdd708c0d052724ffba567 google-noto-sans-cjk-ttc-fonts-20190416-1.el8.noarch.rpm 4f0722dcdf2d0d991caff93ec045892068d7425a3c5caca96b202fb5f7671235 google-noto-serif-cjk-ttc-fonts-20190416-1.el8.noarch.rpm 18a6756341c5e3791726593ed822a6f4d034c048d7a3cd9bb4f36bb85fac5ec7 RLBA-2019:3373 criu bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 RLBA-2019:3374 php:7.2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm 4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee libzip-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm 7be701228840a4780380f627682b07aee0b7ea4b3e4fa9615cc98ebc63782141 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm d266903e8039636d5e5103c26224facf6f9ca1f187e4856061cdbcb46b84a006 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm be3aeb9197b3c5190325c01b689d6ae17107c4c9fb3bbb6701ca678e9ab1f94a php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm 53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.aarch64.rpm 2d0835a7289238557e5580cecf2e147b831bdb41ade179da4f7e1b08ea02b7bf php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.aarch64.rpm 5be2f9794c81af5724be21da86f17c234cf260c83680b1fcee7e8be0057f082c php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.aarch64.rpm cd0cf81a2ff643abbc6bb336d709709b84a00b0cae8d456ec6238cc34f8b525f RLEA-2019:3375 new module: php:7.3 This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:7.3 module to Rocky Linux 8. (BZ#1717858) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 9db75eca747d75a923efd560027b46bb32f951253a49531f1af968675eb93f44 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 7a0ab7cfff41ea3d23fd7f555cb967cf04d5aecbb0574e3562ae2c959524fcd7 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 87357a9a0ba4d3ce3f687c0c74bbc9eb60c5e219ff4aea9a28f198559e2ce793 php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 47fae0285819492edcb35fa668019c11c1bc25f2d2ad00bce030ef2c0789efba php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 96ae3206a8ca88dceb6321db762eaed7e677ee5cce2b7e7ebc8bb97213102a7c php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 6efa2290c09484e32cc18bdf9e2f46058a04f4fd05bc366791fde74308599911 RLBA-2019:3376 python-augeas bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-augeas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-augeas-0.5.0-12.el8.noarch.rpm bf0e98bc5c4aeb4f618e0486831e65376a472041bc0131746af02b56f3048028 RLBA-2019:3382 python-gevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-gevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. d rocky-linux-8-aarch64-appstream-rpms python3-gevent-1.2.2-4.el8.aarch64.rpm abd8c337e74c510f70747128b406ef59b94e7d893310abd6cbf4ea539d0e1835 RLBA-2019:3384 ruby:2.5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.aarch64.rpm d6e83db1ed53961b708866292cbcde971a111734e3b552032fcb204101e1dfdc rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLEA-2019:3399 alsa-plugins bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms alsa-plugins-arcamav-1.1.9-1.el8.aarch64.rpm 32020d0f3e0cb449564ba1f1f17dc2d3c3bdc3faa61cad89c50d16c388387520 alsa-plugins-maemo-1.1.9-1.el8.aarch64.rpm 4fc5a3209cd5a820b1bb17d348ff4a88a080e2473b00f7d7b2d8128bce321a25 alsa-plugins-oss-1.1.9-1.el8.aarch64.rpm 0e24dbf9a934d748203e1ce8694874df4533d07576861115a96157cb2c942843 alsa-plugins-samplerate-1.1.9-1.el8.aarch64.rpm e6a1f33e4dac1546ba8cff460cad65d6819e46f05956a123a4a2f1bbd03013b0 alsa-plugins-speex-1.1.9-1.el8.aarch64.rpm b88a3d28e89913e15ff4ec17c77f5b5982f918c80a05007a520c80c9bba46b89 alsa-plugins-upmix-1.1.9-1.el8.aarch64.rpm ec7b739d6f6f58b8e54e25b8fdd57273278eda7421ad2b40885a4c2bff446f3a alsa-plugins-usbstream-1.1.9-1.el8.aarch64.rpm 37fde84c86620310f45c4ffe06329a3cee8c4451d4a860fd0ad44bcab66bc245 alsa-plugins-vdownmix-1.1.9-1.el8.aarch64.rpm 96e067c3bf494642d74412234049a3aa592eb2512db390c4c509311196e8f0ed RLSA-2019:3403 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLBA-2019:3406 python-gssapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-gssapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-gssapi-1.5.1-5.el8.aarch64.rpm 917fc2f7a3730d8cc2ae92d1dc008305ee08639f18b10398c93a7cf62e8cdf62 RLBA-2019:3411 lttng-ust bug fix and enhancement update This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lttng-ust. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. rocky-linux-8-aarch64-appstream-rpms lttng-ust-2.8.1-11.el8.aarch64.rpm 00540416cde59e9fb65ae5b9f59e21bae4e3f6ffa9c17fd359a3d2fabbbec271 RLBA-2019:3412 X libraries bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libICE, libXt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libICE-1.0.9-15.el8.aarch64.rpm d193bc208626be4a18200b3fa967f1af603b3f4e1fd3edde46e36a5c64b4c20c libICE-devel-1.0.9-15.el8.aarch64.rpm 3c2e438043fef6ebe5da07d361e6ac1337bee0723b0e219eaaf5edc58074cb0a libXt-1.1.5-12.el8.aarch64.rpm 726022cb9db2ea03592de50568d6d90709cb63dd30a15471fe5776bb2ec44113 libXt-devel-1.1.5-12.el8.aarch64.rpm 47dc1d2490c47e2cc2b59ceea17c1d16f49c87f16df8aa39d10e285d390a42af RLBA-2019:3416 pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLEA-2019:3420 enscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for enscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms enscript-1.6.6-17.el8.aarch64.rpm 7c846505db65ee49d44cc26fbc7c7ce9d5fd2e478659613b075b209248b5da31 RLEA-2019:3425 compat-libtiff3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for compat-libtiff3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms compat-libtiff3-3.9.4-13.el8.aarch64.rpm af3dc4d64bea69a389f3622b01edec0cb7cecb1903d796fdcece2263e5552267 RLEA-2019:3426 libpng15 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpng15. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libpng15-1.5.30-7.el8.aarch64.rpm a923f0ee504f10f1ff65608732393a7409aca10be75ede66260f6cc74f51a2ec RLBA-2019:3439 new packages: gcc-toolset-9-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-dwz-0.12-1.1.el8.aarch64.rpm 83e27e22e93f9e767c2b458bfaeea3f84ddd2affb50a3a06495795bd48692e75 RLEA-2019:3443 new packages: gcc-toolset-9-elfutils GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-elfutils packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-elfutils-0.176-5.el8.aarch64.rpm 39ef599ba68423107286f83bf51522b90e578a54e96ee6081d08e521e27e78d4 gcc-toolset-9-elfutils-devel-0.176-5.el8.aarch64.rpm 5da361ecc066ab4ecb5fbf8cec2f4bebc96ceae1aea17da355c08108808e0884 gcc-toolset-9-elfutils-libelf-0.176-5.el8.aarch64.rpm 7d9408f113b1c0d7aaf1349a9a2b2cabc93e48a2dfd082cf8271325bc5ff829a gcc-toolset-9-elfutils-libelf-devel-0.176-5.el8.aarch64.rpm 89aeae9df4b60e74cddbfc71ae8950d51b63f98eaf67ccbe54f8f68dea26eba5 gcc-toolset-9-elfutils-libs-0.176-5.el8.aarch64.rpm f97ff8c8717e6fe023f1c94b6a71514a33723b0bae40cbe6c37f1f97a69c05f6 RLEA-2019:3444 new packages: gcc-toolset-9-valgrind GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-valgrind packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-valgrind-3.15.0-9.el8.aarch64.rpm cc1151f00d24a246b8e02a80bbecd30af6d844943247305f6b51e595d339c577 gcc-toolset-9-valgrind-devel-3.15.0-9.el8.aarch64.rpm 859112d619f3309f4990706077b2b1ca60488d8ad1f8e87752e98e6e7a397af2 RLEA-2019:3447 new module: ruby:2.6 This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:2.6 module to Rocky Linux 8. (BZ#1672575) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.aarch64.rpm 3a517bbe26ade13a9b023fd013c0f7887633c4dabc04dd328edf37a7a2ded43a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.aarch64.rpm fc764cf9237a3d754448a117e5c736df0ee282b2b04dc86b46672edfc8e14e3c rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 RLBA-2019:3449 new packages: gcc-toolset-9-dyninst GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-dyninst-10.1.0-1.el8.aarch64.rpm fdc09539780a155922e1d6a183f1393fbf79b78a3f14dfd19ce675f610ab9503 RLEA-2019:3454 new packages: gcc-toolset-9-systemtap GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-systemtap-4.1-4.el8.aarch64.rpm 993105d4ac6505528689723052a953beb5d873267d4c58252513f56e330b7fd4 gcc-toolset-9-systemtap-client-4.1-4.el8.aarch64.rpm 2cdccf04b3c09ee7b20d54776757acc2917437ade8d3241dd6d4081ff5bf5214 gcc-toolset-9-systemtap-devel-4.1-4.el8.aarch64.rpm 9d77674704f6e61e4d5e22816dfcf9287c598a29a5ee151014a6fa92be21245e gcc-toolset-9-systemtap-initscript-4.1-4.el8.aarch64.rpm 5802fee07c3c63e4538b9b933cbe49ac475f459a16e496c4613a84c9ca7f3bf0 gcc-toolset-9-systemtap-runtime-4.1-4.el8.aarch64.rpm 8ff019e4fd0310792294171d56cd9e9bd79928906f917544cb084c27d16c9b19 gcc-toolset-9-systemtap-sdt-devel-4.1-4.el8.aarch64.rpm b8a36618c05acfe5a03ecb0b0a45f6e9f28add7691cbe07116247fd75a5282c9 gcc-toolset-9-systemtap-server-4.1-4.el8.aarch64.rpm f89726f2b62c97f80058779d913435c6360357d5a0f9e2579e7efef8dd0da1b6 RLBA-2019:3455 new packages: gcc-toolset-9-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-ltrace-0.7.91-1.el8.aarch64.rpm 1767bcef77b1054731bf5c76087c474b6627b912265c0390d217ef2a3c9690e6 RLBA-2019:3457 new packages: gcc-toolset-9-gdb GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-gdb packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-gdb-8.3-1.el8.aarch64.rpm d13f3b216d5091dc7667b7a9e32b3358b731dddd54d17974750b7716413b0eb5 gcc-toolset-9-gdb-doc-8.3-1.el8.noarch.rpm 4aaec69bdf0b16534d6f7a361bd918dc40bf9afa49ad30df39f77d1176b3665b gcc-toolset-9-gdb-gdbserver-8.3-1.el8.aarch64.rpm f6329ebe1b4b2b973ec8d76281436b5f5e128fa828bc14a8d584f6f1a4b1ea91 RLBA-2019:3460 keycloak-httpd-client-install bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keycloak-httpd-client-install. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms keycloak-httpd-client-install-1.0-2.el8.noarch.rpm 9881ad6d70f3e5e696adbb2323d52dc3b4749809aa4ae583a5d7b0eb7fa40ac7 python3-keycloak-httpd-client-install-1.0-2.el8.noarch.rpm dda4420fe5936ec7a993f6417473cd344a1889094be55f8b38a20697fc65a010 RLEA-2019:3461 new module: nodejs:12 This enhancement update adds the nodejs:12 module to Rocky Linux 8. (BZ#1685191) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the nodejs:12 module to Rocky Linux 8. (BZ#1685191) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2019:3462 libcdio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcdio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libcdio-2.0.0-3.el8.aarch64.rpm 89884cd24a1acd863f44d145fda80d9883f4acd40d748d011b1b670a01064631 RLBA-2019:3463 idm:client bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, python-yubico, python-qrcode, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLBA-2019:3465 hplip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hplip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms hplip-3.18.4-9.el8.aarch64.rpm eefffb1dcae8328145a14272018bda04acc8dd0c450778e419c8f944639f112e hplip-common-3.18.4-9.el8.aarch64.rpm f19069b51134719c26d55b079661546b3d55e9d34ee1514dd95afd1dda5b6586 hplip-libs-3.18.4-9.el8.aarch64.rpm 67a35e1d36382abbd1990603b76ec4c345bedd04631ad57555a654b29891f798 libsane-hpaio-3.18.4-9.el8.aarch64.rpm a5594ee90b0eccf5250f082f6ad5b1d3a9284a60aa4cd196d33dfb5e9e4a737e RLBA-2019:3466 libkkc-data bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkkc-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libkkc-data-0.2.7-12.el8.aarch64.rpm 7294a5d6fb704259de374906271a51e2f716152c2ff6720ba56ea4be7a156a74 RLBA-2019:3468 sblim-indication_helper bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-indication_helper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sblim-indication_helper-0.5.0-2.el8.aarch64.rpm 358e680cd54d388e22aeafe261bb961110312dce692e1a3a26bcc48e444342a0 RLBA-2019:3470 python-rpmfluff bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rpmfluff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-rpmfluff-0.5.7.1-2.el8.noarch.rpm aac41c91e05f36ade4d373f9e316c7f4225253392a845a2876450ef792fc0e2f RLBA-2019:3471 container-exception-logger bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for container-exception-logger. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms container-exception-logger-1.0.2-3.el8.aarch64.rpm 5683291104e703853c9c8806eff3061636ff3e6a481d9e711ec37114371a4b9f RLBA-2019:3474 satellite-5-client module update Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugin-spacewalk, rhn-client-tools, rhnsd, rhnlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Satellite 5 client module provides programs and libraries that allow your system to use provisioning, monitoring, and configuration management capabilities provided by Rocky Enterprise Software Foundation Satellite 5. This update fixes the following bugs: * A build dependency on Python 2 (gtk-builder-convert) has been dropped. (BZ#1598450) * Dnf-plugin-spacewalk now displays the correct message about the connection to Rocky Enterprise Software Foundation Satellite. (BZ#1673445) rocky-linux-8-aarch64-appstream-rpms__satellite-5-client dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm c738f38ce26ddcc540a4b59a1d0c2c133be8f2391b0526185a64142906a30a82 python3-dnf-plugin-spacewalk-2.8.5-11.module+el8.3.0+178+27415451.noarch.rpm 65996b41301af857a541928e6ab60fe6ab556f582566dc8cdec0d42284ec7cc4 python3-rhn-check-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 67499d94062084d550fb6ef21d701fb0b9c4af63d6ed314e6c4bae124a9c5c27 python3-rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm d89ef303c00aed2120d4f2d274e1d69930762f72fde62f553326cd760bfb26ce python3-rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm 4ea6368bf1b879bdeb7927df0cc66a74c94e25f918ff7eb7bcac25a8413543e2 python3-rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 0d41cc9b6c41f2e3708378a9fda0245c711fed97997ae86e8ba4c8533fd105cb python3-rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm f19d7e2b24a1832d9248c6d94faf6a82d7cf1c950625dfbcc596926df5ca2ccc rhn-check-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm a38fe93090bed18cda9cd09eab9f751bbe097a1a75a47f76ca9fc26698f8c6e5 rhn-client-tools-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 78b0cc98ca75af7df3805dc20e4c77f8aad65c1eb911a7150158d1b8c21c46d7 rhnlib-2.8.6-8.module+el8.3.0+178+27415451.noarch.rpm b71d82c660d0b4b0da5eb8e25137387c4a9376ff7d17f53ab57c7b87b6679eb8 rhnsd-5.0.35-3.module+el8.3.0+178+27415451.aarch64.rpm 309543de06645b42e83f87472cd49b87e25fa32f755363e12072e8fdf3c54bbf rhn-setup-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm eb658310ccc72119eb2f50e7a9b8015103c764917db74e2170fbea72471f71ef rhn-setup-gnome-2.8.16-13.module+el8.3.0+178+27415451.aarch64.rpm 29a561abeb77109f7be2a19154e429ef4a36c162f1e3b86ed9ac9d79b1309e6e RLSA-2019:3476 Moderate: squid:4 security and bug fix update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: XSS via user_name or auth parameter in cachemgr.cgi (CVE-2019-13345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLBA-2019:3480 inkscape:0.92.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__inkscape python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2019:3487 abrt-java-connector bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abrt-java-connector. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms abrt-java-connector-1.1.0-16.el8.aarch64.rpm 8e2a845d8d9e13062c35d40223714ef22c3cc30e4d9e1c15b9b3548afa973fe1 RLBA-2019:3490 ldns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ldns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ldns-1.7.0-21.el8.aarch64.rpm 72ff2d753297fe80f14b60f06ae96b1be81630a45fc6b3850f014764d5e12aae RLBA-2019:3492 jna bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms jna-4.5.1-5.el8.aarch64.rpm 116c1c5185aacf6f2b50791f66411b8ab6e422ec893e96fdb341d31a7f0be573 RLSA-2019:3494 Important: container-tools:1.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378) * containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLBA-2019:3500 volume_key bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for volume_key. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms volume_key-0.3.11-5.el8.aarch64.rpm 4f8d6ee18589a36f1a30d40f018aecf7f4da51f503d0222e3ef23ba86be90e28 volume_key-devel-0.3.11-5.el8.aarch64.rpm 0acd47694f8ffc6db03487303816ad450d19cdf3f7a178447fc17258fb335ae1 volume_key-libs-0.3.11-5.el8.aarch64.rpm 5b29f47dc2600f0de7d211880e39b20abaf3f90193462a33cb27c630f58df2d2 RLBA-2019:3507 qpdf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qpdf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qpdf-7.1.1-10.el8.aarch64.rpm 6fd272c63da8a9a76e4e684dca0d867680f25d9c5a5a5b391c404434c93efb8e qpdf-doc-7.1.1-10.el8.noarch.rpm 5e25af871159ebffd4b486b696c7cc65f5a0ab695f62237e8f46ba5c43fcd696 qpdf-libs-7.1.1-10.el8.aarch64.rpm d5d4653d17c786862e02c93d9d53f97f3ba1438e23438575fbec1a8355e50303 RLEA-2019:3557 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cmocka, nss_wrapper, uid_wrapper, socket_wrapper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nss_wrapper-1.1.5-3.el8.aarch64.rpm 98c9a82e39fc234e09ebbbb4a0b28bee8b0caabad51cfe72053de7e67cffe39d RLBA-2019:3623 NetworkManager bug fix and enhancement update An update for NetworkManager is now available for Rocky Linux 8. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list An update for NetworkManager is now available for Rocky Linux 8. rocky-linux-8-aarch64-appstream-rpms NetworkManager-libreswan-1.2.10-4.el8.aarch64.rpm 3d1e4d209fc80ba9241f00b5578ef23c62471f0803f60d16c1f8436da53186e9 RLSA-2019:3703 Low: libvorbis security update The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libvorbis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libvorbis-1.3.6-2.el8.aarch64.rpm 1f24d8c4f3a5f1f8d43e7725f75e1d21f79ddfdad23e2debef50fcb24ce48d08 RLSA-2019:3708 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for asio, Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a RLSA-2019:3735 Critical: php:7.2 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm 4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee libzip-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm 7be701228840a4780380f627682b07aee0b7ea4b3e4fa9615cc98ebc63782141 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm d266903e8039636d5e5103c26224facf6f9ca1f187e4856061cdbcb46b84a006 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm be3aeb9197b3c5190325c01b689d6ae17107c4c9fb3bbb6701ca678e9ab1f94a php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm 53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.aarch64.rpm 2d0835a7289238557e5580cecf2e147b831bdb41ade179da4f7e1b08ea02b7bf php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.aarch64.rpm 5be2f9794c81af5724be21da86f17c234cf260c83680b1fcee7e8be0057f082c php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.aarch64.rpm cd0cf81a2ff643abbc6bb336d709709b84a00b0cae8d456ec6238cc34f8b525f RLSA-2019:3736 Critical: php:7.3 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update is available for libzip, php-pear, php-pecl-apcu, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 9db75eca747d75a923efd560027b46bb32f951253a49531f1af968675eb93f44 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 7a0ab7cfff41ea3d23fd7f555cb967cf04d5aecbb0574e3562ae2c959524fcd7 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 87357a9a0ba4d3ce3f687c0c74bbc9eb60c5e219ff4aea9a28f198559e2ce793 php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 47fae0285819492edcb35fa668019c11c1bc25f2d2ad00bce030ef2c0789efba php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 96ae3206a8ca88dceb6321db762eaed7e677ee5cce2b7e7ebc8bb97213102a7c php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 6efa2290c09484e32cc18bdf9e2f46058a04f4fd05bc366791fde74308599911 RLBA-2019:3785 libcacard bug fix and enhancement update The libcacard packages contain the Common Access Card (CAC) emulation library. This update fixes the following bug: * Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477). Users of libcacard are advised to upgrade to these updated packages, which fix this bug. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcacard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libcacard packages contain the Common Access Card (CAC) emulation library. This update fixes the following bug: * Backport the patch removing key caching to unbreak libcacard for CI usage (BZ#1750477). Users of libcacard are advised to upgrade to these updated packages, which fix this bug. rocky-linux-8-aarch64-appstream-rpms libcacard-2.7.0-2.el8_1.aarch64.rpm 3bb75c150e449fab565e8330769971c20b88bdd65928ea537936e3d1000c5738 libcacard-devel-2.7.0-2.el8_1.aarch64.rpm 8f170020cd3aedd49a021b047d20f9357aa4d5f77ac0c51086b6508d50f4c022 RLBA-2019:4266 inkscape:0.92.3 bug fix update Bug Fix(es): * New inkscape (rpm) is actually older than current (BZ#1773655) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * New inkscape (rpm) is actually older than current (BZ#1773655) rocky-linux-8-aarch64-appstream-rpms__inkscape python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2019:4268 idm:DL1 bug fix update Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516) rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2019:4269 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318) * backport json-file logging support to 1.4.2 (BZ#1770176) * Selinux won't allow SCTP inter pod communication (BZ#1774382) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for oci-umount, oci-systemd-hook. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318) * backport json-file logging support to 1.4.2 (BZ#1770176) * Selinux won't allow SCTP inter pod communication (BZ#1774382) rocky-linux-8-aarch64-appstream-rpms__container-tools oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 RLSA-2019:4273 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.aarch64.rpm 6e5257c97e3c8a2b8b331e3c2097277a8fb5d9990422577c33a323f8b9569205 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm c2100f07874354a1f304d402844c28f1b6ff8f96c53200c5e59da13c584752d4 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.aarch64.rpm 2468766f6dbadccbfaf096533d81f7bcd6abb816bbf40d8f00206a173e1cc599 skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm a04c781f8d0becd66616937ac06fee8aa0598eaa6b2239f49b4d6f237a892b91 RLBA-2019:4274 virt:rhel bug fix update Bug Fix(es): * Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829) * [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133) * Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134) * [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * Rocky Linux8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm) (BZ#1764829) * [HPE 8.1 BUG] Icelake: KVM missing .pconfig (BZ#1775133) * Failed to create a VM via virt-manager or web console in Rocky Linux8.1 snapshot-2.1 (BZ#1775134) * [Intel 8.2 Bug] Icelake-Server host, mode=host-model: "can't apply global Icelake-Server-x86_64-cpu.pconfig=off: Property '.pconfig' not found" (BZ#1775137) rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2019:4275 nodejs:12 bug fix update The following packages have been upgraded to a later upstream version: nodejs (12.13.1). (BZ#1776116) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The following packages have been upgraded to a later upstream version: nodejs (12.13.1). (BZ#1776116) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:0279 Moderate: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLEA-2020:0330 nodejs:12 enhancement update The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLEA-2020:0346 new module: postgresql:12 This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the postgresql:12 module stream to Rocky Linux 8. (BZ#1721822) For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLBA-2020:0347 perl-DBD-Pg:3.7 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 RLSA-2020:0348 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for containernetworking-plugins, python-podman-api, udica, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:0579 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.19.0). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) * npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775) * npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776) * npm: Global node_modules Binary Overwrite (CVE-2019-16777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.19.0). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) * npm: Symlink reference outside of node_modules folder through the bin field upon installation (CVE-2019-16775) * npm: Arbitrary file write via constructed entry in the package.json bin field (CVE-2019-16776) * npm: Global node_modules Binary Overwrite (CVE-2019-16777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:0598 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.16.1). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.16.1). Security Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605) * nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string (CVE-2019-15604) * nodejs: HTTP header values do not have trailing optional whitespace trimmed (CVE-2019-15606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1293 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1317 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1379 Important: container-tools:rhel8 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194) * fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016) * buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, python-podman-api, slirp4netns, containernetworking-plugins, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1] (BZ#1803495) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1804188) * Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/podman] (BZ#1804194) * fuse-overlayfs segfault [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/fuse-overlayfs] (BZ#1805016) * buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-Rocky Linux8-Rocky Linux-8.1.1/buildah] (BZ#1806119) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:1354 gcc-toolset-9-binutils bug fix update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1783958) rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-binutils-2.32-17.el8_1.aarch64.rpm 136e35bbeb3398687504f5911685eca7adeb36b7099433df0a259b6cea08790c gcc-toolset-9-binutils-devel-2.32-17.el8_1.aarch64.rpm 26c3932a038e89f263ef61550614fb313cf955a0be33950050a493bb2f0d1279 RLSA-2020:1358 Important: virt:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE-2020-1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opt (BZ#1809510) rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2020:1360 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, oci-umount, runc, skopeo, oci-systemd-hook, containernetworking-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() (CVE-2020-7039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.aarch64.rpm 6e5257c97e3c8a2b8b331e3c2097277a8fb5d9990422577c33a323f8b9569205 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm c2100f07874354a1f304d402844c28f1b6ff8f96c53200c5e59da13c584752d4 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.aarch64.rpm 2468766f6dbadccbfaf096533d81f7bcd6abb816bbf40d8f00206a173e1cc599 skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm a04c781f8d0becd66616937ac06fee8aa0598eaa6b2239f49b4d6f237a892b91 RLEA-2020:1575 perl-Convert-ASN1 and perl-LDAP bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-LDAP, perl-Convert-ASN1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms perl-Convert-ASN1-0.27-17.el8.noarch.rpm de1154a5c04f83967e174cbba8f9bd58092b7e14b2b5eca7e54a3773682fa2b7 perl-LDAP-0.66-7.el8.noarch.rpm 5432e985d9d62e78169dd98c5a7d0de76b1a31d59f04fa3909a1ab0613d8ee81 RLSA-2020:1577 Moderate: exiv2 security, bug fix, and enhancement update The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgexiv2, gnome-color-manager, gegl, exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gegl-0.2.0-39.el8.aarch64.rpm 6225aa7b36af6ea27e8f31594d45f9ec2341483d8fcd714eb1f6f3867fde5f1e libgexiv2-0.10.8-4.el8.aarch64.rpm 9b859809de3d17bbde61370bb66327d0b296b6294e051c282fc41a107b1d5ca8 RLEA-2020:1579 whois bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for whois. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms whois-5.5.1-2.el8.aarch64.rpm cc5d863ad16f5c011fe2dfff24e80bc2f09c21df243fad6209a547c7050779fb whois-nls-5.5.1-2.el8.noarch.rpm 379cce764a95fc9cdcb5fdcb29a0ce4e18673fbf5322373cda4b933c826884de RLEA-2020:1587 virt:rhel bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2020:1599 libselinux-python:2.8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__libselinux-python libselinux-python-2.9-2.1.module+el8.4.0+532+c114ce35.aarch64.rpm 5c69d9ecbbb0dac8a69a1d8250b6e993b6d8b44f241e3495bf75897f21a1c484 RLSA-2020:1605 Moderate: python27:2.7 security, bug fix, and enhancement update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944) Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. The following packages have been upgraded to a later upstream version: python2 (2.7.17). (BZ#1759944) Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python: Cookie domain check returns incorrect results (CVE-2018-20852) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python: email.utils.parseaddr wrongly parses email addresses (CVE-2019-16056) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b RLBA-2020:1606 python-dbus-python-client-gen bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dbus-python-client-gen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-dbus-python-client-gen-0.7-3.el8.noarch.rpm 7d569bd78a0864038991eb97d5612f8f03c12187d7ab4cd00a3dc8624d681a7e RLEA-2020:1607 http-parser bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for http-parser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms http-parser-2.8.0-9.el8.aarch64.rpm ed1bbb31714e17942c84e6f89ebd2979fe6ad995fb5933dc5835dcccd1a44580 RLEA-2020:1611 input stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xkeyboard-config, libevdev, libxkbcommon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libxkbcommon-0.9.1-1.el8.aarch64.rpm a0d5180639b9b1d89545bfd2f3490b05cd0f091a318cc320ba66e483e164a2cc libxkbcommon-devel-0.9.1-1.el8.aarch64.rpm 1eddfce5ef8588ecf9b2ac26a09ac6ba771f031eb605126bca35d129380d10fb libxkbcommon-x11-0.9.1-1.el8.aarch64.rpm e709b6e5df21ee363c8581da1b108640f42b15ca84e36b5effb42a5ba08c7aca xkeyboard-config-2.28-1.el8.noarch.rpm 66853f37796011f8bd91e5068c80e00d74d7a98d1c468f416116bac1d3d4db6e xkeyboard-config-devel-2.28-1.el8.noarch.rpm dc85f4de371ffcf6bff0e96e67fc3af9671509bc37055ff54635e1775ac6497e RLSA-2020:1616 Low: irssi security update Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for irssi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms irssi-1.1.1-3.el8.aarch64.rpm 33b62512878a3854eaba6e09c4a41f3e34e865fa0efd9f9b3b01c0435a5bb765 RLBA-2020:1622 python-greenlet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-greenlet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-greenlet-0.4.13-4.el8.aarch64.rpm 3a888f7a01e8d423815b8d10e966901925de92a5b9865b95ca0ef6c608a4b65d RLBA-2020:1623 python-flask bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-flask. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-flask-0.12.2-4.el8.noarch.rpm 37969a333ba99baa0be2ac55b1d5e624630cd26a45ab29dc8f9b752da1f2ad97 RLSA-2020:1624 Moderate: php:7.2 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981) Security Fix(es): * php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020) * php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639) * php: Invalid read in exif_process_SOFn() (CVE-2019-9640) * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: Buffer over-read in PHAR reading functions (CVE-2018-20783) * php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021) * php: memcpy with negative length via crafted DNS response (CVE-2019-9022) * php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023) * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024) * php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034) * php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035) * php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php, php-pecl-apcu, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.2.24). (BZ#1726981) Security Fix(es): * php: Invalid memory access in function xmlrpc_decode() (CVE-2019-9020) * php: File rename across filesystems may allow unwanted access during processing (CVE-2019-9637) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9638) * php: Uninitialized read in exif_process_IFD_in_MAKERNOTE (CVE-2019-9639) * php: Invalid read in exif_process_SOFn() (CVE-2019-9640) * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: Buffer over-read in PHAR reading functions (CVE-2018-20783) * php: Heap-based buffer over-read in PHAR reading functions (CVE-2019-9021) * php: memcpy with negative length via crafted DNS response (CVE-2019-9022) * php: Heap-based buffer over-read in mbstring regular expression functions (CVE-2019-9023) * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c (CVE-2019-9024) * php: Heap buffer overflow in function exif_process_IFD_TAG() (CVE-2019-11034) * php: Heap buffer overflow in function exif_iif_add_value() (CVE-2019-11035) * php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure (CVE-2019-11036) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpm 4b8310f3980d49aafc8a9098f45f69cab6c6d24c967f8b357541a22621c47cee libzip-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm 7be701228840a4780380f627682b07aee0b7ea4b3e4fa9615cc98ebc63782141 libzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm d266903e8039636d5e5103c26224facf6f9ca1f187e4856061cdbcb46b84a006 libzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.aarch64.rpm be3aeb9197b3c5190325c01b689d6ae17107c4c9fb3bbb6701ca678e9ab1f94a php-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm e0ac878a050bc502bbaccb49d1cf812fea5dd9fa6b6aaf24c0a9794998f59db5 php-bcmath-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 1940dec62c555db9bca0b629ff093a1e8469f8a0f8a244cf8447b2c33653154a php-cli-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm f26a1b63339610388019115ab051d9c4d4f8ec018886f999d41b6bbe1e905fcd php-common-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 36ecac8bac45abf84a2364d0babfdeb2ac78a810b0922319f7762b67c000845b php-dba-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm ca8f62fb7f439bdbdc30314087c1af2b1286a475b37628cd08918e6be98fe7a2 php-dbg-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm a874f6463c7e24da5bb7c90aab07087e7118524acba0036ae527638ed09fecfb php-devel-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 071e077a4f7d29e317121e6ebaee2a2b348615f39dd8d78b3c7bf2535626df87 php-embedded-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 198e158a022509f50b7cf7c05b29bda58097987c77912e01197c39c33d4e94e4 php-enchant-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 2f2af2bd342b31c6c831ff697ad61be675f2bd15f6e1a05df77018dcecd5d439 php-fpm-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 97be5754dc4fcb30bba3d0c2d942012df37094c070610b7f5044dfae77696772 php-gd-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 745e44773959a83c9dda4d3b2771e26a1c1e7971d77260ebbd811bcd85638f1a php-gmp-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm c3aedbac5be93e74155fae3521d591949bdb9a765980c46819829d9a41c81734 php-intl-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 355752badb0285864dfdcc2d3a78fb5c94d9d9dfedc3631ee72865866d87aa93 php-json-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 802ed23d0be1f7ffd87ea7559c51d0be748c4b9c1929a1d52bf46a2e46a7718f php-ldap-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 87ec22ce403e906a209e4310e2728bde4499d86097ff239b24b1d7b5ae69a8ce php-mbstring-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm ecd1ead75a8c62e3b698f6c0e354b114595335be45889d51cea9f410e11585b9 php-mysqlnd-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 19c2d40900e5caf424161ad2de5883924b19119933a9d5772e81437e924be1e2 php-odbc-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 13036e4fb9a798df0653689f5681983722c769e2ca9060a1f51041182fa15570 php-opcache-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm bb1706eccd49ad6bd3bf5bf1c578eeee4334d574c7de0dca9d93e4fb30260200 php-pdo-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 0827dd94a2d95ba3b92a38078acf988af2ec14e7d435235dc57c81de497f26c9 php-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpm 53d93e110ac02f191341248649791187f8474454500c2137eefe0c3fa35a68e9 php-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.aarch64.rpm 2d0835a7289238557e5580cecf2e147b831bdb41ade179da4f7e1b08ea02b7bf php-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.aarch64.rpm 5be2f9794c81af5724be21da86f17c234cf260c83680b1fcee7e8be0057f082c php-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.aarch64.rpm cd0cf81a2ff643abbc6bb336d709709b84a00b0cae8d456ec6238cc34f8b525f php-pgsql-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 8280428d571e7901705f82f3fa3d549d7a05dd7ada90951a24e957c679e4c6a5 php-process-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 6a95e1774f199cddddb41a3f39adcda1f1088898e8e98bf0bba8bd2baec3c333 php-recode-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm c44b45e7299764d624aef00d5f5bc88eeca146bc4d7003dbf3c8150a9e7b6cef php-snmp-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm a811d870735789b62f825b28dd6f5a7e07b30dc06a02125a3b303734f48ada9e php-soap-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 014e47be7f71a9011040095d469c8a5fcf4137773720e17a98d97861ac9d3e3b php-xml-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm af6e0838c644c682accae301397019021aa45a7d275a3d2ada02b1fc1bbc0f4c php-xmlrpc-7.2.24-1.module+el8.4.0+413+c9202dda.aarch64.rpm 02680e6dcfa8ed44d27f262cbf1943132281d8284f0677a71b3fd641c7629bba RLBA-2020:1626 ltrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ltrace-0.7.91-28.el8.aarch64.rpm 807eaa6c485be3873a14ef18e3297dfaa463d71f553841db80c03860da9b31ed RLSA-2020:1631 Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmad, gstreamer1-plugins-ugly-free, gstreamer1-plugins-bad-free, SDL2, orc, gstreamer1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gstreamer1-1.16.1-2.el8.aarch64.rpm 1da07afcb7827d22a0c825fee89f82f879b3a38b9ee4576aa0440c52eca3dce0 gstreamer1-devel-1.16.1-2.el8.aarch64.rpm 49fb827a3dedfa4c7c9dc0c86560ce975836b07e8db5b80272e3e507691dc4b2 gstreamer1-plugins-bad-free-1.16.1-1.el8.aarch64.rpm a053d4c5afb3239bc3f18fc85d3ad9221eb41f173fe7c1b255322d887b05cff1 gstreamer1-plugins-ugly-free-1.16.1-1.el8.aarch64.rpm ecda0dbd30acee6c37c18f5c717f6b45c8c3a653c42b0065aedac4b95757f9df libmad-0.15.1b-25.el8.aarch64.rpm d8219e9e51794b67944b254c41f9115fc48185a8453825824f83ebeda82e5d5a orc-0.4.28-3.el8.aarch64.rpm 80d197b5848ab90f17efcd1149d4235c4cdabed3625c767c3f5f80cd79362ccc orc-compiler-0.4.28-3.el8.aarch64.rpm 98cd8484de2ab63447bc7d2cdd041515d68b0d621f8ab681c3a5a095de3c163b orc-devel-0.4.28-3.el8.aarch64.rpm a10f29ef3f5ee38a88817f23f857e2e147f4d359219ad099687f973d687b3bf3 RLBA-2020:1633 xorg X11 server and driver bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libepoxy, wayland, libxcb, mesa-libGLw, wayland-protocols, libXpm, xorg-x11-drv-libinput, pixman, xorg-x11-drv-wacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libxcb-1.13.1-1.el8.aarch64.rpm 22cd6b4ee21ed95199ad537921c8d2169c5ba039ab1e024b0da86b79a4e7c4c0 libxcb-devel-1.13.1-1.el8.aarch64.rpm daa9ed189a924c5df2a6d5f33d2c76dec679ae784c0d831fc13fb11e5417dc34 libXpm-3.5.12-8.el8.aarch64.rpm 34de1a4405c5248c182764eb7f8c1320af44d8e5550e004ce1b3b27d97fad83c libXpm-devel-3.5.12-8.el8.aarch64.rpm 80299f9baad2a4e95749b3ac0e9fbcb7987ec5645b78d5b5201d25bf9bbf6d2f mesa-libGLw-8.0.0-18.el8.aarch64.rpm d6e700327d23ed210d2d06162acafed95ae1cce726bad1774e582282c14186ad mesa-libGLw-devel-8.0.0-18.el8.aarch64.rpm 0299688bea964241af5760e5d0da21a1c5a4823d6a86713fc2edda9a4a3c32d1 xorg-x11-drv-libinput-0.29.0-1.el8.aarch64.rpm 162c6a48b68fbc027b3de8a6f33ef7ebf489140df0f816228b64930987899327 xorg-x11-drv-wacom-0.38.0-1.el8.aarch64.rpm 7635494ff9cadbb7729947792599caa248140159cf1cb3319cd87330078d31d9 xorg-x11-drv-wacom-serial-support-0.38.0-1.el8.aarch64.rpm 320c014c1c739911b3c3a1b53f80bbd8f4105746c3af546960ff0151bf8d5da5 RLEA-2020:1640 idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2020:1644 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLSA-2020:1650 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921) * containers/image: Container images read entire image manifest into memory (CVE-2020-1702) * podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation (CVE-2019-19921) * containers/image: Container images read entire image manifest into memory (CVE-2020-1702) * podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created (CVE-2020-1726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:1661 xorg-x11-drv-qxl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-drv-qxl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xorg-x11-drv-qxl-0.1.5-11.el8.aarch64.rpm 1bbbf91815911a3dbae116ad8f27ab356aac9982a0829c416f4121f8d6a370b5 xorg-x11-server-Xspice-0.1.5-11.el8.aarch64.rpm 3d8e430a3eda894029fbdde75d489371db882b7b31a8811ec30953f0b90b6eb1 RLBA-2020:1666 gcc-toolset-9 bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-9.0-4.el8.aarch64.rpm d00079fb0b176cd885ec5cc7241dc9c4a34e4bac492095efe0a86b59c9573428 gcc-toolset-9-build-9.0-4.el8.aarch64.rpm 1fcb5fa35e2589f7a6e750bac8c1065c1f8609641cdbeed9a2aebfced655bf0a gcc-toolset-9-perftools-9.0-4.el8.aarch64.rpm 270a52ae6fc1fe6713b076898a79cee0e1cd82cb1908e93a978fa0b2bab783d8 gcc-toolset-9-runtime-9.0-4.el8.aarch64.rpm c22f8ef2f50a44b757abd7b0f534be7a15482fc1b0f0646a86c55e8c04a4af58 gcc-toolset-9-toolchain-9.0-4.el8.aarch64.rpm ad4788ddc5b6a92a2fa7624493e1c567190874a7836bbc494379a0a43598ede1 RLBA-2020:1669 python-networkx bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-networkx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-networkx-1.11-16.1.el8.noarch.rpm f36caec5411961dccb9763811ad3bf42705e11aaf0e35f8d540e999e50aa93d1 python3-networkx-core-1.11-16.1.el8.noarch.rpm d2a88d113da8555607b9e2e85ebfed61a061d4da03098456722838993c25229c RLBA-2020:1673 perl-IO-Socket-SSL bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-IO-Socket-SSL. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd RLEA-2020:1675 new module: container-tools:2.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:2.0 module to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:2.0 module to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:1686 Low: libmspack security and bug fix update The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmspack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libmspack-0.7-0.3.alpha.el8.4.aarch64.rpm 941e96ad95d9d4b753b63ba6f58b7f62134514f0f55deeee4358036679758e40 RLBA-2020:1690 gtk-vnc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk-vnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gtk-vnc2-0.9.0-2.el8.aarch64.rpm 759f6c61c6dabf648da2cea8983c8abbe233dd911aa80ae0d43bf549e8191ac5 gvnc-0.9.0-2.el8.aarch64.rpm b13deed9da81ea4879141455f1c7a839608a7ed11fafa8d7db16f32956621256 RLEA-2020:1692 php:7.3 enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 9db75eca747d75a923efd560027b46bb32f951253a49531f1af968675eb93f44 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 7a0ab7cfff41ea3d23fd7f555cb967cf04d5aecbb0574e3562ae2c959524fcd7 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 87357a9a0ba4d3ce3f687c0c74bbc9eb60c5e219ff4aea9a28f198559e2ce793 php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 47fae0285819492edcb35fa668019c11c1bc25f2d2ad00bce030ef2c0789efba php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 96ae3206a8ca88dceb6321db762eaed7e677ee5cce2b7e7ebc8bb97213102a7c php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 637cc258b1924cec817bd8ff639a8e2762efa3d5cffefb462f8313317732daf3 php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 6efa2290c09484e32cc18bdf9e2f46058a04f4fd05bc366791fde74308599911 RLEA-2020:1694 new module: python38:3.8 This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-urllib3, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python-asn1crypto, python-py, python-chardet, python-markupsafe, python-pluggy, Cython, python-psutil, python-wcwidth, babel, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.aarch64.rpm 7b2d3894385ece11897a9697d9f90ed6ce17cda40980d295919369fe140c8b13 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 19b4eb8c7fc998d915be1de87f41b5aa455bb618b6ef606aac2743a29a108132 python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm bab1991b44f95916cdd7be3a832a779b2479e6a5528706d955f97a3f20cd1761 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 24f2309bb7ba0415cd0e694ee705f32d28a4023a0bc407089cb1cc088cce869c python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.aarch64.rpm ebe4eccdf7f60bcd962279c10f4b674752dbdb7e3323b7539aa35eb7df6e6203 RLBA-2020:1695 luksmeta bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for luksmeta. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libluksmeta-9-4.el8.aarch64.rpm 3a864ee0fc294764b0eb48b3db7594b7e241217c6394072c72c2574bf6070e2f libluksmeta-devel-9-4.el8.aarch64.rpm ba946284c193271c3bc91037a6f668d9b2738aff9412e7e7905617bae2a5a1a6 luksmeta-9-4.el8.aarch64.rpm a0c73f0678dae1649dd9a7071ada3bd8493066fbb54677895d285ec22ab4401a RLBA-2020:1700 libbytesize bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbytesize. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libbytesize-1.4-3.el8.aarch64.rpm dc7a2e9ef3822b19a84d7ee645b60474e4072c0497140505949dc1ba7b177b1d python3-bytesize-1.4-3.el8.aarch64.rpm c7eb6994c481b5db33a50ca90575da86549c72625977d088458b150a3323947c RLSA-2020:1708 Moderate: liblouis security and bug fix update Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg). Security Fix(es): * liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684) * liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685) * liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577) * liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for liblouis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille (Nemeth and Marburg). Security Fix(es): * liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c (CVE-2018-11684) * liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c (CVE-2018-11685) * liblouis: Segmentation fault in logging.c:lou_logPrint() (CVE-2018-11577) * liblouis: Stack-based buffer overflow in compileTranslationTable.c (CVE-2018-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms liblouis-2.6.2-21.el8.aarch64.rpm 33255d80542a8a8d90be2e5f5fd190e86285a80ade380b5607510d35ca5226ad python3-louis-2.6.2-21.el8.noarch.rpm 89093ded5e8ce00b591e22de53b605d382def59dd9758607f9b211fbd71836b3 RLEA-2020:1711 new module: maven:3.6 This enhancement update adds the maven:3.6 module to Rocky Linux 8. (BZ#1783926) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the maven:3.6 module to Rocky Linux 8. (BZ#1783926) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLBA-2020:1713 gcc-toolset-9-binutils bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Bug Fix(es): * Certain Intel CPUs are affected by the Jump Conditional Code (JCC) bug causing machine instructions to be executed incorrectly. Consequently, the affected CPUs might not execute programs properly. The full fix involves updating the microcode of vulnerable CPUs, which can cause a performance degradation. This update enables a workaround in the assembler that helps to mitigate the performance loss. The workaround is not enabled by default. To apply the workaround, recompile a program using GCC with the "-Wa,-mbranches-within-32B-boundaries" command-line option. A program recompiled with this command-line option will not be affected by JCC flaw, but the microcode update is still necessary in order to fully protect a system. Note that applying the workaround will increase the size of the program and there can still be a slight performance decrease, although it should be less than it would have been without the recompilation. (BZ#1779417) rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-binutils-2.32-17.el8_1.aarch64.rpm 136e35bbeb3398687504f5911685eca7adeb36b7099433df0a259b6cea08790c gcc-toolset-9-binutils-devel-2.32-17.el8_1.aarch64.rpm 26c3932a038e89f263ef61550614fb313cf955a0be33950050a493bb2f0d1279 RLEA-2020:1718 jolokia-jvm-agent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jolokia-jvm-agent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms jolokia-jvm-agent-1.6.2-3.el8.noarch.rpm 3d359cdb5143b577cca66c7991883d437d25806cf0391361055b2e348b8b3490 RLBA-2020:1723 parfait:0.5 bug fix update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api, log4j12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__parfait si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm 6d238596ee6d6869db170d90a9e9839e5c028ff1678dc08a7e8378978eb08b0b si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm a20389dc20459d8e277b084b313764a9171b7a63c2a83066dcf5c7de70f09aa5 unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 45f3ea7141aeeab01121669fb9d1c71287d16b63126ead63ee3a0fa485fb6e34 unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 14e336b8562c8c326f1bf24d01515952681212155fdeee137857ba73261b7b0d uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm 94e383d27797c3563dd284f31e97761f3c859fabd6d43e6e2ddcfe2d66026d59 uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm e28c245a0b6063f0cbae3e3dd0f8512c857d581acd0425605e372967df6e2d61 uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm 665b5f7355b65fd698defae938b12f45a0cbd09982662343e43d1e75bd76c628 uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm 1c5a33c14a4db1f5c1dde1b82c0847034c2b6643969a5d5511dade96439129f9 uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm bb06bb8d9e6d73cf8ed4d8a4c53289397dff79610badd5740d5e98c5250083f5 uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm ff8729c2bfb1bc8ee1d487882734d0e07fcf552e6eb3223b7d2ddd1686880b14 uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm 1bcb94fdab29d21ff7974980bb81f9d5165e81eeeaea52f0360905b1a9f8a187 RLBA-2020:1726 ipvsadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipvsadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ipvsadm-1.31-1.el8.aarch64.rpm 16eb7df2cc8a9cc1d22acb31b7fdbdeb6595e5ffcf8aa0ad3912d75626cdd251 RLBA-2020:1737 gcc-toolset-9-strace bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-strace-5.1-6.el8.aarch64.rpm f62cd3196fe62a5a2f0da768beeb371b9efe566b248c5ad847edf4c40c22d1f0 RLBA-2020:1741 python-reportlab bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-reportlab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-reportlab-3.4.0-8.el8.aarch64.rpm e27992aab9525fe0eacc47a1253a09f4f41500c0920027f119a2fdd7ab3c1b39 RLBA-2020:1742 gcc-toolset-9-make bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-make-4.2.1-2.el8.aarch64.rpm 080519182de913719d18d3fc98f1b92383599234fed53598bc604df1edd8c55b gcc-toolset-9-make-devel-4.2.1-2.el8.aarch64.rpm f2f4753fec2d13c81bf164794d545adcfd9142bd4fe01e195a164d7cc222a9a0 RLBA-2020:1743 librevenge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librevenge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms librevenge-0.0.4-12.el8.aarch64.rpm 7b33144819f7e7259452e761c4dcb10ca3f6f189dfd32e81aff09a7bc9e15024 librevenge-gdb-0.0.4-12.el8.aarch64.rpm 3c468503f13b586122ed9857500587216638a1b1dd1970cfce1e20a9f6ac97cd RLBA-2020:1745 python-pycurl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pycurl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pycurl-7.43.0.2-4.el8.aarch64.rpm c5b653022625a4148e75133442e4bfe3ee0a6aab257e407339cd424b543d3d0b RLBA-2020:1750 sblim-cmpi-base bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-cmpi-base. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sblim-cmpi-base-1.6.4-14.el8.aarch64.rpm 37eff0813e667b899f0b04a819636f2a7a45da4889e9d816e17afdac77b1b123 RLBA-2020:1752 driverctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for driverctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms driverctl-0.111-1.el8.noarch.rpm 71db251f4803f836e8613ed8eddfe590a275a40ab60918d207bbfb8220ef6620 RLBA-2020:1754 gcc-toolset-9-annobin bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.2 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-annobin-9.08-4.el8.aarch64.rpm 48fe2b6d63a4b2efbe138e1d642f7b78b4024215fb73cb4b17e75f19b5201d03 RLSA-2020:1926 Important: container-tools:1.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * conflicting requests: failed to install container-tools:1.0 (BZ#1813776) * podman run container error with avc denied (BZ#1816541) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, slirp4netns, oci-systemd-hook, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * conflicting requests: failed to install container-tools:1.0 (BZ#1813776) * podman run container error with avc denied (BZ#1816541) rocky-linux-8-aarch64-appstream-rpms__container-tools container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.aarch64.rpm 2468766f6dbadccbfaf096533d81f7bcd6abb816bbf40d8f00206a173e1cc599 slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.aarch64.rpm 8410ea43b59b1ed7abd0064ed9f3f0afeda79b41a275ea7c85193b3278ae644a RLBA-2020:1928 nodejs:12 bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:12 module for Rocky Linux 8.2 (BZ#1811502) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:12 module for Rocky Linux 8.2 (BZ#1811502) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2020:1929 nodejs:10 bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:10 module for Rocky Linux 8.2 (BZ#1811499) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * Rebuild the nodejs:10 module for Rocky Linux 8.2 (BZ#1811499) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:1931 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:1932 Important: container-tools:rhel8 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Crafted input tar file may lead to local file overwrite during image build process (CVE-2020-10696) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:2041 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLBA-2020:2456 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1834346) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, runc, toolbox, python-podman-api, slirp4netns, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1834346) rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2021:4230 ipa bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLSA-2021:4231 Moderate: libwebp security update The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009) * libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010) * libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012) * libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330) * libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331) * libwebp: excessive memory allocation when reading a file (CVE-2020-36332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libwebp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: out-of-bounds read in WebPMuxCreateInternal (CVE-2018-25009) * libwebp: out-of-bounds read in ApplyFilter() (CVE-2018-25010) * libwebp: out-of-bounds read in WebPMuxCreateInternal() (CVE-2018-25012) * libwebp: out-of-bounds read in ShiftBytes() (CVE-2018-25013) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: out-of-bounds read in ChunkVerifyAndAssign() in mux/muxread.c (CVE-2020-36330) * libwebp: out-of-bounds read in ChunkAssignData() in mux/muxinternal.c (CVE-2020-36331) * libwebp: excessive memory allocation when reading a file (CVE-2020-36332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libwebp-1.0.0-5.el8.aarch64.rpm 1cca29d20057cf3ba67cacd64a3a68e7259914ef272faa684d41570230be050b libwebp-devel-1.0.0-5.el8.aarch64.rpm b8bdbd4b87208ff7de4b3294e7890864fe8e10963c4fe73bb257183ec04dd58a RLEA-2021:4234 mesa and related packages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-server-Xwayland, libepoxy, wayland, wayland-protocols, libdrm, xorg-x11-server, egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libepoxy-1.5.8-1.el8.aarch64.rpm f4597c5ef7abf20e06a7ace308ab3112d3c8f7006798f1ee4339a7d3d0c2e736 libepoxy-devel-1.5.8-1.el8.aarch64.rpm 198dc425d8d11fa483de1df8ecb674c74b9ed4276b08e09c3d143b04fe60a4c2 libwayland-client-1.19.0-1.el8.aarch64.rpm 5ae59bc4d564ccec1e5bf6924dba6d3b8927e07e82bc42767bcb11f4fba49e7a libwayland-cursor-1.19.0-1.el8.aarch64.rpm 6b839018367f8f5bdddabd78be243ee7817b6a723b5ed4956417429750dc1f00 libwayland-egl-1.19.0-1.el8.aarch64.rpm a75aa0d7d5680f12e5a8191796b954e2b21e77a53538725db2d0ff7788532a3a libwayland-server-1.19.0-1.el8.aarch64.rpm ce77c1d4101cc91096283738a486393e0c467a2f57b16fb7b8a70e1704cbcb38 wayland-devel-1.19.0-1.el8.aarch64.rpm c4b59d39ccf3744cffa8bd770257ad563a16a00387ced2b7969cb444d0c73610 RLSA-2021:4235 Moderate: jasper security update JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jasper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms jasper-libs-2.0.14-5.el8.aarch64.rpm 28b2b8fbdfb5afe9e40b4895a215af2f157a317484765559b963b0b64c15b19e RLEA-2021:4239 pki-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 pki-servlet-4.0-api-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm e5e14595fb89c52de31e9c18905ff0f305c68812d2756b12c2991c6da74d5548 pki-servlet-engine-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm 73172dac5348a21d14d062762eeea65d223ca1bb1ab8b63c47e7b8685c8ef79a python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm 92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 rocky-linux-8-aarch64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f RLEA-2021:4242 new packages: gcc-toolset-11-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dwz packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-dwz-0.14-2.el8.aarch64.rpm 30896746ef2ff2412b45724354bb78903a354c0de96b207d91c41573542b9044 RLBA-2021:4244 dwz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dwz-0.12-10.el8.aarch64.rpm e126868cad7588b81b563ceff10644644e51a54bb5addbf0e94022531104920d RLEA-2021:4246 cmake bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cmake. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cmake-3.20.2-4.el8.aarch64.rpm 7996f3f8efed202e1a36529d80df10459f428c36c499bbe2717746a7b74aea74 cmake-data-3.20.2-4.el8.noarch.rpm 3eb6cae9285351ed5df68d5f98d396dab1f5125577a0c42381640da78854be55 cmake-doc-3.20.2-4.el8.noarch.rpm afd4d5f0d1eb996de0186288a429f72d37e08b1dd99a496be29a53f5412514f3 cmake-filesystem-3.20.2-4.el8.aarch64.rpm 598cb3353712697dd6ffc3e4957d30bdc5097a7f9153f6630835bb28cd83e9fd cmake-gui-3.20.2-4.el8.aarch64.rpm bd362a0d93cbab99c457c8df46d708186cac8eec02fccd513ec36559fb629004 cmake-rpm-macros-3.20.2-4.el8.noarch.rpm 77231aae5f117ce89706ca1918261d89d013df1471294267211ad0e5b6bf3e11 RLBA-2021:4255 copy-jdk-configs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for copy-jdk-configs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms copy-jdk-configs-4.0-2.el8.noarch.rpm 84ec4532ff1042cad6ce9340a36e6522af0e09eb2bbe77152b5af79aaff1d2b7 RLSA-2021:4256 Moderate: graphviz security update Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for graphviz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms graphviz-2.40.1-43.el8.aarch64.rpm 71474b75c81727a24acb070333ab185f001822b36ec4e87900a5793600374076 RLSA-2021:4257 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690) * httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session: NULL pointer dereference when parsing Cookie header (CVE-2021-26690) * httpd: Unexpected URL matching with 'MergeSlashes OFF' (CVE-2021-30641) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLBA-2020:2457 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1836978) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman: Please backport correction patch for the native container healthchecks (BZ#1836978) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:2774 Important: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Slirp: potential OOB access due to unsafe snprintf() usages (CVE-2020-8608) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2020:2848 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.21.0). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.21.0). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:2852 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.2). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.2). Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) * nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598) * nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172) * nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:3032 Moderate: mod_auth_openidc:2.3 security and bug fix update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Module stream mod_auth_openidc:2.3 does not have correct module.md file (BZ#1844107) rocky-linux-8-aarch64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 167194b776db1036319dda56b06909ff2660411660b1904aa3744804890143c5 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 147c2a485b610d217ea9d1b92fce09583e1eeeebf7c1ac0d792ec5e61cf8c508 RLBA-2020:3036 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udica, toolbox, python-podman-api, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman 1.6.4 is not honouring --security-opt when --privileged is passed (BZ#1846364) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:3053 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-podman-api, udica, toolbox, runc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.aarch64.rpm 38de2a7e33c1986c26e6f537f419e1b7df4f050cd7bf8eb637ca36d4710cf833 toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2020:3623 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLSA-2020:3662 Moderate: php:7.3 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655) Security Fix(es): * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045) * php: Information disclosure in exif_read_data() (CVE-2019-11047) * php: Integer wraparounds when receiving multipart forms (CVE-2019-11048) * oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224) * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) * oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163) * oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203) * oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204) * pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454) * php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059) * php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060) * php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062) * php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063) * php: Information disclosure in exif_read_data() function (CVE-2020-7064) * php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) * php: Out of bounds read when parsing EXIF information (CVE-2019-11050) * oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246) * php: Information disclosure in function get_headers (CVE-2020-7066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.3.20). (BZ#1856655) Security Fix(es): * php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() (CVE-2019-11039) * php: Buffer over-read in exif_read_data() (CVE-2019-11040) * php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte (CVE-2019-11045) * php: Information disclosure in exif_read_data() (CVE-2019-11047) * php: Integer wraparounds when receiving multipart forms (CVE-2019-11048) * oniguruma: Use-after-free in onig_new_deluxe() in regext.c (CVE-2019-13224) * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) * oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c (CVE-2019-16163) * oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c (CVE-2019-19203) * oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c (CVE-2019-19204) * pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454) * php: Out of bounds read in php_strip_tags_ex (CVE-2020-7059) * php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function (CVE-2020-7060) * php: NULL pointer dereference in PHP session upload progress (CVE-2020-7062) * php: Files added to tar with Phar::buildFromIterator have all-access permissions (CVE-2020-7063) * php: Information disclosure in exif_read_data() function (CVE-2020-7064) * php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution (CVE-2020-7065) * php: Heap buffer over-read in exif_scan_thumbnail() (CVE-2019-11041) * php: Heap buffer over-read in exif_process_user_comment() (CVE-2019-11042) * php: Out of bounds read when parsing EXIF information (CVE-2019-11050) * oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c (CVE-2019-19246) * php: Information disclosure in function get_headers (CVE-2020-7066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpm c97ec12f1dbee8455adffc51067cd0de34b50dd3876d136c2c4443140fc3ac45 libzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 9db75eca747d75a923efd560027b46bb32f951253a49531f1af968675eb93f44 libzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 7a0ab7cfff41ea3d23fd7f555cb967cf04d5aecbb0574e3562ae2c959524fcd7 libzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 87357a9a0ba4d3ce3f687c0c74bbc9eb60c5e219ff4aea9a28f198559e2ce793 php-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 2c842e62304993c00a820504ba31ea395840f30418fafd87edaa36834f07461e php-bcmath-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm af5e600bf68ad284ffaf3b3c11e4376fc14d671e47dad40d14a545aa7a98ed46 php-cli-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 3d85fa19bb4aacbd68b2bd2923699572247dccbd02d3f6d46baeedf3f50af3c5 php-common-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm e7e428992b1965c7965091a2237d218f7f337ba509e9a12cb21befc715cd213a php-dba-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm f3f0aafd8f9ea136cacfd2428e616467817f076a1f72f6cae11b025772b48940 php-dbg-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 22173916b91a046b0085531c9c1edf53c4a3a22d91302983d8a614c24cd76e2d php-devel-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 752fe3f0dc6a94ebbbff60b4bc1eb9b71097fbd9f38b44926cb9aa0c048a6276 php-embedded-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm f9260aea2745f8ee94544ea4100c3658d781266e0494df6eaddf03a0d4734a9b php-enchant-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm bd4218835a5661c3655af600751783cf1d075550bc77205d9be07d4a91e33687 php-fpm-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm bb83ec016044c7609977bc96fe80afad2ca7b78b12f934d221a03317548cdce0 php-gd-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 3ab49836838cff49e4ef07fce0498d44af6dcd846da80c8a2bc06e90b583d4a3 php-gmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm cf69f546eb8e04fd7661187c92c8ea6e2bdf3088c9369cf1da840a2d8d951027 php-intl-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 1ecb347911b8e1747c5d2e65d6bfe0b9d9e6d62b42c4df025c54a3ac6b4ea939 php-json-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm aec8dacf0727645dc065ed7667350490829bfd2bd7adb13eabbaca2c246d89d9 php-ldap-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 26875eb89cce50f725d73351a6947c85d046953904dc043656da7881212a9835 php-mbstring-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 2b849313341a16f0cf1afe4cc8e8ad13899a12eee36d05f1054f12e150614689 php-mysqlnd-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 1247108b11d93cc0d91d282ff8aac253ef2d3c06340b7386cac64b60b91694a5 php-odbc-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 0777df73c72b28fcb237c45e920c2fdb9953a2a08161397c2777710cfaa065e4 php-opcache-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm dbaccb90a7b8e1e2f5617905495499df65c799a7ba52decaf2c2e99867a54096 php-pdo-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 57ad322bdb47b8b1d43e78b8e1f1891fb1a6fe47f433fd678f12430c4da5e58e php-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpm 33fb022d7b2c98a186462522c62e7cc761e1c63a497f6fdfc7c7809dd28cd744 php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 47fae0285819492edcb35fa668019c11c1bc25f2d2ad00bce030ef2c0789efba php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 96ae3206a8ca88dceb6321db762eaed7e677ee5cce2b7e7ebc8bb97213102a7c php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 637cc258b1924cec817bd8ff639a8e2762efa3d5cffefb462f8313317732daf3 php-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 6efa2290c09484e32cc18bdf9e2f46058a04f4fd05bc366791fde74308599911 php-pgsql-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm ae4b05642ac7c8ad57f02b7dc8563f9aafe324fb6c06c471d0c05892c7774bcc php-process-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm b5f34669fbefca57bde4d149d49a941a2caaaa715a0a98577f8f797de2f4bcd3 php-recode-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fe445c04eb5627de7228ae592cddc1be8d313b2feb8c97d7d1f6f6555520aee6 php-snmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 7be8508a8f20341fc0c4d2a8a4e24d5862bb61945174d4ca22dba044ce630cab php-soap-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm 5ed21eab5c0a43bb15c3be448eafd2d9e278bd2778061a0e76235d861780d8ef php-xml-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm c98218f36720c2063ea80b5e1232133374c14a9e314764f5ffe8df00a4924fa8 php-xmlrpc-7.3.20-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm b11857b70a653d08ab9f8ad285578d50280397cb0573776815e83a678fa21f31 RLSA-2020:3732 Important: mysql:8.0 security update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.21). Security Fix(es): * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725) * mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619) * mysql: Server: Connection unspecified vulnerability (CVE-2019-3009) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632) * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620) * mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574) * mysql: Server: Logging unspecified vulnerability (CVE-2020-2770) * mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804) * mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921) * mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553) * mysql: Server: UDF unspecified vulnerability (CVE-2020-14576) * mysql: Server: JSON unspecified vulnerability (CVE-2020-14624) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651) * mysql: Server: Locking unspecified vulnerability (CVE-2020-14656) * mysql: Information Schema unspecified vulnerability (CVE-2019-2911) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.21). Security Fix(es): * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2020-14663, CVE-2020-14678, CVE-2020-14697, CVE-2020-2761, CVE-2020-2774, CVE-2020-2779, CVE-2020-2853, CVE-2020-14586, CVE-2020-14702) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2019-2914, CVE-2019-2957) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2019-2938, CVE-2019-2963, CVE-2019-2968, CVE-2019-3018, CVE-2020-2577, CVE-2020-2589, CVE-2020-2760, CVE-2020-2762, CVE-2020-2814, CVE-2020-2893, CVE-2020-2895, CVE-2020-14568, CVE-2020-14623, CVE-2020-14633, CVE-2020-14634) * mysql: Server: PS multiple unspecified vulnerabilities (CVE-2019-2946, CVE-2020-2925) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2019-2960, CVE-2020-2759, CVE-2020-2763, CVE-2020-14567) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2019-2966, CVE-2019-2967, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2998, CVE-2020-2579, CVE-2020-2660, CVE-2020-2679, CVE-2020-2686, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2901, CVE-2020-2904, CVE-2020-2923, CVE-2020-2924, CVE-2020-2928, CVE-2020-14539, CVE-2020-14547, CVE-2020-14597, CVE-2020-14614, CVE-2020-14654, CVE-2020-14680, CVE-2020-14725) * mysql: Server: C API multiple unspecified vulnerabilities (CVE-2019-2993, CVE-2019-3011) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2019-2997, CVE-2020-2580) * mysql: Server: Parser multiple unspecified vulnerabilities (CVE-2019-3004, CVE-2020-2627, CVE-2020-2930, CVE-2020-14619) * mysql: Server: Connection unspecified vulnerability (CVE-2019-3009) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2020-2584, CVE-2020-14632) * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2020-2588, CVE-2020-2780, CVE-2020-14540, CVE-2020-14575, CVE-2020-14620) * mysql: C API multiple unspecified vulnerabilities (CVE-2020-2752, CVE-2020-2922, CVE-2020-14550, CVE-2020-2570, CVE-2020-2573, CVE-2020-2574) * mysql: Server: Logging unspecified vulnerability (CVE-2020-2770) * mysql: Server: Memcached unspecified vulnerability (CVE-2020-2804) * mysql: Server: Stored Procedure unspecified vulnerability (CVE-2020-2812) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2020-2896, CVE-2020-14559, CVE-2020-2694) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-2898) * mysql: Server: Connection Handling unspecified vulnerability (CVE-2020-2903) * mysql: Server: Group Replication Plugin unspecified vulnerability (CVE-2020-2921) * mysql: Server: Group Replication GCS unspecified vulnerability (CVE-2020-2926) * mysql: Server: Pluggable Auth unspecified vulnerability (CVE-2020-14553) * mysql: Server: UDF unspecified vulnerability (CVE-2020-14576) * mysql: Server: JSON unspecified vulnerability (CVE-2020-14624) * mysql: Server: Security: Audit unspecified vulnerability (CVE-2020-14631) * mysql: Server: Security: Roles multiple unspecified vulnerabilities (CVE-2020-14641, CVE-2020-14643, CVE-2020-14651) * mysql: Server: Locking unspecified vulnerability (CVE-2020-14656) * mysql: Information Schema unspecified vulnerability (CVE-2019-2911) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm e7df893453d68958b2697ccbcb1752533f83e53f24a3d7126ed452d0bf645c6a mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm 0ac811884f2cc859f907f1c6272ee524ba31b137b1c05848e2ec91c2f65aefbf RLSA-2020:4059 Important: virt:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libiscsi, netcf, sgabios. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2020:4272 Moderate: nodejs:12 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.4). Security Fix(es): * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201) * npm: Sensitive information exposure through logs (CVE-2020-15095) * libuv: buffer overflow in realpath (CVE-2020-8252) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * The nodejs:12/development module is not installable (BZ#1883966) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.18.4). Security Fix(es): * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: HTTP request smuggling due to CR-to-Hyphen conversion (CVE-2020-8201) * npm: Sensitive information exposure through logs (CVE-2020-15095) * libuv: buffer overflow in realpath (CVE-2020-8252) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * The nodejs:12/development module is not installable (BZ#1883966) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2020:4435 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-abrt, abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-abrt-1.2.6-6.el8.aarch64.rpm 826bcce110ddf206dd3f437f5f5d740ab6e7b0b8d5107ef6893ef1252cb5120d libreport-2.9.5-15.el8.rocky.6.3.aarch64.rpm 4f2638cb4bc9bdfa14176e993fc549641827ccc8a7515b09c8c2c5fc7aba177f libreport-anaconda-2.9.5-15.el8.rocky.6.3.aarch64.rpm ba6c6a14a2f1e6611647d11f40481a3233b53e4390cd8bf06923c8d574950f3b libreport-cli-2.9.5-15.el8.rocky.6.3.aarch64.rpm 58eb51d2cbe70da398bc07e04ceb1505d0ece045fffc5232d2b5c46d387957c4 libreport-gtk-2.9.5-15.el8.rocky.6.3.aarch64.rpm 43f2ba67eef77771e1b1c39abb6a7861ae460b9c6093f63f35384e8a4292b7e3 libreport-newt-2.9.5-15.el8.rocky.6.3.aarch64.rpm 02ae9cdeebb4bfb7ed8d22d2915e1c68ac1159eacd42823a40fa6ad70992b156 libreport-plugin-bugzilla-2.9.5-15.el8.rocky.6.3.aarch64.rpm 443f5dcb49aa42356b75cca7dab9f276ac3d562bcda45f0dc40cb01042dca051 libreport-plugin-kerneloops-2.9.5-15.el8.rocky.6.3.aarch64.rpm 50c397d8567be5eee5196ce82fadb948fd0ff55e67fcaa810e25ef48bbf21e52 libreport-plugin-logger-2.9.5-15.el8.rocky.6.3.aarch64.rpm 459e0be8597e04d77334fea14308afc145f4f9056fac4d971094d8171cdb10bf libreport-plugin-mailx-2.9.5-15.el8.rocky.6.3.aarch64.rpm 3418af6c347135cfa8fb71924c5bc0092fb7a6d6fb42e469a4b5a349beb39bb9 libreport-plugin-reportuploader-2.9.5-15.el8.rocky.6.3.aarch64.rpm cab4b6fdea6d238d763aaf4307b820a5ed3249f55c5723a3eb627d07c5a046b1 libreport-plugin-rhtsupport-2.9.5-15.el8.rocky.6.3.aarch64.rpm 63457cd81b6d3dfc3cc509d4b29ce59aa0888fff192c80a2e5394280143618c7 libreport-plugin-ureport-2.9.5-15.el8.rocky.6.3.aarch64.rpm 30eb9e498330e6d700bf58e5b8f7803d3cc8e38adbb1db1276e35d389cab8bc1 libreport-rhel-2.9.5-15.el8.rocky.6.3.aarch64.rpm 2a31f8894611bec419558c2eb29efd62ccf949c23ce8c893b98ba633ef9644d8 libreport-rhel-anaconda-bugzilla-2.9.5-15.el8.rocky.6.3.aarch64.rpm c82c3df45c75cdac2d20302c08ce76d572b7357d7a461defeb12bc672e13bccd libreport-rhel-bugzilla-2.9.5-15.el8.rocky.6.3.aarch64.rpm fb19a16167f9079784e5dbffa1c0d8fccbfa7115245050089d509b6b788bd2ab libreport-web-2.9.5-15.el8.rocky.6.3.aarch64.rpm 7423bf2c5d4bf6a14c0b9a5e5178edfe2630b64682c71b94a0331cbdfebec526 python3-libreport-2.9.5-15.el8.rocky.6.3.aarch64.rpm fe7a62097dc6f47bb2f3d17f55dd9d013d84518c5d67818a80e86927aa89626d RLBA-2020:4621 iperf3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iperf3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms iperf3-3.5-6.el8.aarch64.rpm 393f0cfc1332f6c739ae53b26e8d03a7424c750900423a3206b1194a1236f415 RLSA-2020:4629 Moderate: libvpx security update The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvpx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libvpx-1.7.0-8.el8.aarch64.rpm e95deb120926f43815963bead71a846df290fe77ac0b3b03b3c169d7e52dddcf RLBA-2020:4630 wget bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wget. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms wget-1.19.5-10.el8.aarch64.rpm ddcc88a9d9b74c99df181c50b5188a3f23b05628c2d455012164c2b7b55f2ca0 RLBA-2020:4633 swig:3.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for swig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__swig swig-3.0.12-19.module+el8.4.0+385+82b6e804.aarch64.rpm 069594644133f029d296da9f449714b4ea6c9b9c543d2e3a9a9909eac88a7a09 swig-doc-3.0.12-19.module+el8.4.0+385+82b6e804.noarch.rpm 796cea2ad5be73af934d2b97b8c00121f097496f215bd867f1de4645bedc5619 swig-gdb-3.0.12-19.module+el8.4.0+385+82b6e804.aarch64.rpm b40ec790fce3c224786490d55af49026127227ab894e75c5e519a3dc4f4412b4 RLBA-2020:4640 radvd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for radvd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms radvd-2.17-15.el8.aarch64.rpm 0739748650e00d26775cebaf62bb038f94f2ec8eb30ee096dab07d69fe685368 RLSA-2020:4641 Moderate: python38:3.8 security, bug fix, and enhancement update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416) Security Fix(es): * PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477) * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psycopg2, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8.3). (BZ#1847416) Security Fix(es): * PyYAML: command execution through python/object/apply constructor in FullLoader (CVE-2019-20477) * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * PyYAML: arbitrary command execution through python/object/new when FullLoader is used (CVE-2020-1747) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.aarch64.rpm 7b2d3894385ece11897a9697d9f90ed6ce17cda40980d295919369fe140c8b13 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 19b4eb8c7fc998d915be1de87f41b5aa455bb618b6ef606aac2743a29a108132 python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm bab1991b44f95916cdd7be3a832a779b2479e6a5528706d955f97a3f20cd1761 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 24f2309bb7ba0415cd0e694ee705f32d28a4023a0bc407089cb1cc088cce869c python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.aarch64.rpm ebe4eccdf7f60bcd962279c10f4b674752dbdb7e3323b7539aa35eb7df6e6203 RLSA-2020:4647 Moderate: freerdp and vinagre security, bug fix, and enhancement update FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287) Security Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vinagre. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287) Security Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms vinagre-3.22.0-23.el8.aarch64.rpm bc10ccb9bfe72447a7267f0ffc60f5295c42ca1f28cce0ac2c4032755fb84421 RLSA-2020:4649 Low: evolution security and bug fix update Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. OpenChange provides libraries to access Microsoft Exchange servers using native protocols. Security Fix(es): * evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for bogofilter, evolution-mapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. OpenChange provides libraries to access Microsoft Exchange servers using native protocols. Security Fix(es): * evolution-data-server: Response injection via STARTTLS in SMTP and POP3 (CVE-2020-14928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bogofilter-1.2.5-2.el8.aarch64.rpm c4980aae3ed21ad1a3233276c642adec6c2049560fa0853676389d0b2b7dbf13 RLSA-2020:4654 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-docutils, pytest, python-psycopg2, python-PyMySQL, python-lxml, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python-py, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.aarch64.rpm a09b0362a51a0d1e18fe75ed1833a38d34930603682d48fabe7df8d84216b822 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLBA-2020:4658 munge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for munge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms munge-0.5.13-2.el8.aarch64.rpm f3804b40f4b692db83c692717d23387d56810f2a7e1b5ec230ce7e6b1e4c64af munge-libs-0.5.13-2.el8.aarch64.rpm 845997dcde93ef61a7618a68c29ef06607a90ed4147c28a0183907cf04c46135 RLSA-2020:4659 Moderate: gd security update GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats. Security Fix(es): * gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977) * gd: NULL pointer dereference in gdImageClone (CVE-2018-14553) * gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG, GIF, WebP, XPM, BMP images, among other formats. Security Fix(es): * gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c (CVE-2019-6977) * gd: NULL pointer dereference in gdImageClone (CVE-2018-14553) * gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gd-2.2.5-7.el8.aarch64.rpm 0359680ea9e107a0b9a43623964e7e22384d554f79899aea6038eb6a1f4835ec gd-devel-2.2.5-7.el8.aarch64.rpm 58839e20886a9f782088eaf8ca407518c00640a14a18a7a4c475ab72091fb632 RLEA-2020:4664 memcached bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memcached. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms memcached-1.5.22-2.el8.aarch64.rpm 4a4cc29776ada98af299a50aa729b1e95d0653bbfa784c2078aa15aa144cb1d4 RLBA-2020:4665 lftp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lftp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms lftp-4.8.4-2.el8.aarch64.rpm b274755314c186b37fe6ac05de3c167d8c28c09b78e45cd8c6ba1029a5aa5dc5 lftp-scripts-4.8.4-2.el8.noarch.rpm cad46fc4eaa97de1a51c59d7e8679f8e838083898a49929dd1fec5cd9d69ca7a RLSA-2020:4670 Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877) Security Fix(es): * js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * ipa: No password length restriction leads to denial of service (CVE-2020-1722) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877) Security Fix(es): * js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * ipa: No password length restriction leads to denial of service (CVE-2020-1722) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2020:4676 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296) Security Fix(es): * libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339) * QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296) Security Fix(es): * libvirt: leak of /dev/mapper/control into QEMU guests (CVE-2020-14339) * QEMU: Slirp: use-after-free during packet reassembly (CVE-2019-15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE-2020-14301) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2020:4678 tog-pegasus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tog-pegasus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tog-pegasus-2.14.1-46.el8.aarch64.rpm 7c2f0c7912118bc0f2a4fcf16ed066793a066e28887e548322af9c8d66db74c2 tog-pegasus-libs-2.14.1-46.el8.aarch64.rpm 3ce2bf2cb8be6387212d963ff0a4e12dd62e2ef5d3f34ed2fcb70c2528d9fc2e RLBA-2020:4679 pptp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pptp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms pptp-1.10.0-4.el8.aarch64.rpm acc0641724b33c33e91035271c66c9d750918b5844c2e8310c47aa5a501e3801 RLBA-2020:4681 ncompress bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ncompress. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ncompress-4.2.4.4-13.el8.aarch64.rpm 7fbac4d6db2313f844068cc9125f8f55c4dc6e0f4923b6e16cbe4c59ea336432 RLBA-2020:4688 itstool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for itstool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms itstool-2.0.6-2.el8.noarch.rpm 887a6d89077f2c036291b58afa8bf12d6d871d82469ffb8a8b629130c21bc9e8 RLSA-2020:4694 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-podman-api, libslirp, toolbox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749) * QEMU: slirp: networking out-of-bounds read information disclosure vulnerability (CVE-2020-10756) * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 RLEA-2020:4700 createrepo_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for drpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms drpm-0.4.1-3.el8.aarch64.rpm f11871f7848a9ad9876a23cf3fbfd20c3700267bdb590e9c4fcced17bd3b3a6a RLBA-2020:4704 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python36 python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.aarch64.rpm 1fe2e5c3d5840ddb5141a1845ddffe8c88ee30f64ef4906b5853ad9b643794c9 rocky-linux-8-aarch64-appstream-rpms__python27 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLBA-2020:4707 spice-protocol bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-protocol. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spice-protocol-0.14.2-1.el8.noarch.rpm c00444c95aa153b8a621e3086e3a63cc9dd5fda8f1f46cf7a5a7c96f4bba8dd9 RLSA-2020:4709 Moderate: librsvg2 security update The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library. Security Fix(es): * librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for librsvg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The librsvg2 packages provide a Scalable Vector Graphics (SVG) library based on the libart library. Security Fix(es): * librsvg: Resource exhaustion via crafted SVG file with nested patterns (CVE-2019-20446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms librsvg2-2.42.7-4.el8.aarch64.rpm 7caf98de989d08c2a2ca6e10512f19198b69f289b32045bceedd359ed255812a librsvg2-devel-2.42.7-4.el8.aarch64.rpm 01f46bdc2c972eaa81e262f9f0a724fdf90ae442457ad6aaf9b417efbb036e93 librsvg2-tools-2.42.7-4.el8.aarch64.rpm 761a5935cb0f5e961f0f46f28bce1fc359158a6d9c822324f349dd7f77563f78 RLEA-2020:4711 HdrHistogram_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for HdrHistogram_c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms HdrHistogram_c-0.9.13-2.el8.aarch64.rpm 21abaedfe2abdb02d8487ab570fdf1f65e4183eac80cb49e0526c3d732602874 RLSA-2020:4712 Moderate: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 RLEA-2020:4713 python-dasbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dasbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-dasbus-1.2-2.el8.noarch.rpm 2bee6c760ce64f9a0c0f286ed8865993d24a71a6d31ce56bf3fd55c20307cbf7 RLSA-2020:4847 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLBA-2020:4715 chan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms chan-0.0.4-3.el8.aarch64.rpm e5ce82e22bee7db1f11eb7a1af7e1b1bfa30a6ccb09f702f27f6ffc9f55d6de4 RLBA-2020:4717 new module: php:7.4 This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:7.4 module to Rocky Linux 8. (BZ#1797661) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac RLBA-2020:4723 bpg-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bpg-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bpg-algeti-fonts-2.005-11.el8.noarch.rpm 47e6874b1c41f7f8fb9af54dbf5bbbd84540a380fc3c59b1498d442b8960de3c bpg-chveulebrivi-fonts-3.002-11.el8.noarch.rpm 1ed1607a6fc5e6182532d24b68089af6c17712e53a9ad347d194a07da37d262c bpg-classic-fonts-8.500-11.el8.noarch.rpm c4489256ab3ad73a8de16bc7fb096ad6cb1f8115e48f4a19c733bf3dd6460d99 bpg-courier-fonts-4.002-11.el8.noarch.rpm 5b53df9a759a1f5b5b7b4e0eb22391663ad3b8182e6cfe514f1baa92c321dd0c bpg-courier-s-fonts-4.000-11.el8.noarch.rpm e5958e7c6e2314c0640e1405faf7aff87f9f36925c10b3d0c3be3e6ab5169812 bpg-dedaena-block-fonts-3.005-11.el8.noarch.rpm d82a6f3febe389229e3c6258e1c8b26b4ceb19b92e1c400a26b5976ae8d16598 bpg-dejavu-sans-fonts-2.28-11.el8.noarch.rpm 1112365fa2797fced4f6dd5011f9a663f8af3517b93db6d2ed36618d0fbd188c bpg-elite-fonts-3.000-11.el8.noarch.rpm feca73e375e64fb414d392b2ffbaec526d8249f4294317176e758426ba8f1f90 bpg-excelsior-caps-fonts-2.003-11.el8.noarch.rpm 2d82c9702963480fa2790f4d877768acff685ea8fa7a54c2c78f5c93052dbaf7 bpg-excelsior-condenced-fonts-2.003-11.el8.noarch.rpm 2d08bb6292d03ea4f35b452460ac670387363748baf05cf8de2ce391fbee73ef bpg-excelsior-fonts-2.03-11.el8.noarch.rpm 012c43fc487f0ef864c6b2de33884f934150ef1bc460f898b108fd7e84d58e89 bpg-fonts-common-20120413-11.el8.noarch.rpm 61b7c5b6e0f61a9eb355e6dd27ae076e57af8a2a9ec0195d86447ad7b49e34b2 bpg-glaho-fonts-9.000-11.el8.noarch.rpm efd53c80a4c2c4839cf1a393b361bc7224f37ae8cee1238663d8365eb2cd5d8b bpg-gorda-fonts-2.003-11.el8.noarch.rpm 1c385b59bc5570227569621f983379b20baf6f810f6f73182bcaff8dd81f00f1 bpg-ingiri-fonts-4.000-11.el8.noarch.rpm 72bc5b7db73a2f2f1fdf0c47dca130964179a2cbc3517e5f063f7823ad3bd581 bpg-irubaqidze-fonts-1.000-11.el8.noarch.rpm 4e6caf5c2c1b33b23028b6c9549900997ec814f4a82fb21e3555225092f78228 bpg-mikhail-stephan-fonts-2.500-11.el8.noarch.rpm 55400c32dec1f9648420b8957ff553afde11ad2669d31e354df5097593276b92 bpg-mrgvlovani-caps-fonts-1.002-11.el8.noarch.rpm c0da6baafe1316d13523a487436047653f27ab9c2a2c36ce9bfbe56f5f315cdc bpg-mrgvlovani-fonts-1.002-11.el8.noarch.rpm 2fe663408a4c49559e32751b9501f6e6f0e732e3e58a6f7a788370214dd777f5 bpg-nateli-caps-fonts-2.003-11.el8.noarch.rpm cedee72fb59958ae0157b7036e2aa4c1e6c82626f16520842b18a3fb00169811 bpg-nateli-condenced-fonts-2.003-11.el8.noarch.rpm 484e9bbab1ec19deeb501173c0061943a0714859f576bdd4ab617cfc5d9a2216 bpg-nateli-fonts-2.003-11.el8.noarch.rpm ca437135ac44fb40b0697b6221307ed35da5063b62de03f5d845cf22d5a62441 bpg-nino-medium-cond-fonts-4.005-11.el8.noarch.rpm 16a888290ba281ae33090c6acb4d87a956331e26ab6997e525def891670aaee1 bpg-nino-medium-fonts-4.005-11.el8.noarch.rpm b67a48532714366c3f94089c38f26cbd46e5c07adaeeed6775fe72de6e0f2eb7 bpg-sans-fonts-1.005-11.el8.noarch.rpm cf90e4b021f205476c1dffe9a8e340d571960681bccbd4d418acfe8eb2520499 bpg-sans-medium-fonts-1.005-11.el8.noarch.rpm 5d6ff7f18f2d7c8415be6867308d9085b6e16a07f9e6bdd0348140417f442a59 bpg-sans-modern-fonts-2.025-11.el8.noarch.rpm 63e9e7ccd18f2333b5053647a1b882d33b55630e3d83cd49388bda80bf833c02 bpg-sans-regular-fonts-1.005-11.el8.noarch.rpm 5f95b3c84182a3a10fdd518277db8ba54ca88a3fe943c4ae2aa7adc41bca74c9 bpg-serif-fonts-1.005-11.el8.noarch.rpm c92fdd513eb927718cc07391e07072f0c933c2997337c2cc72255074946055a0 bpg-serif-modern-fonts-2.028-11.el8.noarch.rpm 72175ee483fcd31713aadcf7652dac55d0ab6b5f50757a4a1175b5bc130a13d3 bpg-ucnobi-fonts-3.300-11.el8.noarch.rpm 84b2d3be17f380b7d4704c95dc5e439f9d20633e7ea345f6391f31b69b8e5e50 RLEA-2020:4724 perl-IO-Socket-SSL:2.066 and perl-libwww-perl:6.34 update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-Net-HTTP, perl-HTTP-Message, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-WWW-RobotRules, perl-HTTP-Date, perl-LWP-Protocol-https, perl-Net-SSLeay, perl-TimeDate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-libwww-perl perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 4f838ceea3cf5dfefffdebe0181ef879213ea9c143a6d77859b8f97d37d7f2a2 perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f8ac7791b06c47866c5e688dacaef16d8bbc56e760e71ace7610b12fa6b1da1 perl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpm 3aaec32b508f40a97b7274018a707339b6a5877493b84f55769a47d84fbb7a5f perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.aarch64.rpm c56e84cd88cc361ec1330518eefa0a8231284c9509fe316f89adb3d6b57baf40 perl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpm 6f41b83ba68e184bda30ef525a7600673733aa444c2713bffb572eb691818b2d perl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 39a934c51411a833c333671b2a7df180f1c9d0ef251889a8c1e9d48701cee459 perl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9862723272cc2aba25739dc251961e0cbd90be7e3b3eb9a0eaf79c1b8504f080 perl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 0d9b36f3c0e80cadb8b5282c1b3be01f6501e2b1d95e80e84d9fb3b24a6f7e52 perl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm 9a1c248fb9f94b77b6b5afa60bef8e145057c8d1031957e09bfd42e188e17309 perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm 321334e0883dd66f5c7b6aa86ea601e5a1a831dd0950032128ac3909032bc343 perl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpm 7f33a736a361b53262ce8cbd273f26b8debe23f4f3fb0a1817d4c519ca2471c6 perl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 3416b0bcbd18b2b38276c15376eb1560dace73dc40c613e5434a4b956ddf52bf perl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm e6121208c088b4a8c6d95d89aeee50c265ca21c7cd35ec9fde3ffc087fecdf49 perl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm c350bea5407e56eb42eda4cbc77895da0ad65ae5ce23e08543fc3cfe56939793 perl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm bf26ed1f8417e1a76d8bc96d609e74c2c8af22c5e3194b1c7d5dbb1fa7bdd911 perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpm c0a260b0aaddebf1df80c0b98ea0f24abc32b2f7711f67c4982559dd19b98d7a perl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm 47f5249f76519dc5d16c9dd6d74d51ba1c62ca0937e544395f9e67b10cf2f3cd perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpm 1d87ab90226348884ea3741f614e33782a9176a71227f7d14c6fbc2aa69c35b9 perl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpm 4cb2c5f159200cb752acaca0293501f413bae3e4fc0a2263b633f847b5ab3d7d rocky-linux-8-aarch64-appstream-rpms__perl perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm 85d5b8dca8c11735fe4bb387756c332e49af51227cf76cce4ae44bae6a8641e0 rocky-linux-8-aarch64-appstream-rpms__perl-IO-Socket-SSL perl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm 66596fd038085e18580a2475417a0a66f3ace6d74ac5e69dddf3ab8b15afa0bd RLBA-2020:4726 libmaxminddb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmaxminddb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libmaxminddb-1.2.0-10.el8.aarch64.rpm 80acbbbf3896827fbc2286ae1a8876bc73c49f94f59ca77c5c25998213ee6816 libmaxminddb-devel-1.2.0-10.el8.aarch64.rpm 772cc60ac15d6666e72085fdbcf8c484a2b502e731499007dd846e0e04567b9e RLEA-2020:4732 new module: nodejs:14 This enhancement update adds the nodejs:14 module to Rocky Linux 8. (BZ#1815402) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the nodejs:14 module to Rocky Linux 8. (BZ#1815402) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLBA-2020:4738 fio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fio-3.19-3.el8.aarch64.rpm 4a1ef914b0226755f76b09d71aa303bd6200669bb8ecd35b612f5b8f28887387 RLEA-2020:4742 userspace graphics, xorg-x11, and mesa bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libXft, xorg-x11-xkb-utils, xorg-x11-xtrans-devel, xorg-x11-drv-intel, libvdpau, libxkbfile, libXxf86dga, libXau, libXrandr, xorg-x11-proto-devel, xorg-x11-util-macros, libXext, libXi, libXdmcp, libXmu, libXvMC, mesa-demos, xorg-x11-drv-ati. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms glx-utils-8.4.0-5.20181118git1830dcb.el8.aarch64.rpm 61754e7f61a1655b2cd406b7cac10f7bb671b5c6ef6cf8b4818d5401679984cb libvdpau-1.4-2.el8.aarch64.rpm dd48a746a83da428638146fb64807b4d81dc98e4ecbf0eb7f270c40dbe93652a libXau-1.0.9-3.el8.aarch64.rpm 65137a5358789d01fbf2d44b86470c3c07b5256843a2decb4c1bafd5437e03be libXau-devel-1.0.9-3.el8.aarch64.rpm 2f4328ac4be0eec1967bea70cfdc6b48a1202e2d351959a39fce88d171f6d8c3 libXdmcp-1.1.3-1.el8.aarch64.rpm c1a9040ddf409db9059a586b8dd413b2030585608728ffddf90f8487453c55da libXext-1.3.4-1.el8.aarch64.rpm 04014cbecef59b96e53390b57eb6b2d99d4b5aac01967c70906d9f5fc65545df libXext-devel-1.3.4-1.el8.aarch64.rpm a9c90784bec4df16e046b362a2973b37bf0af4f2bbda65a91511ca46f936185a libXft-2.3.3-1.el8.aarch64.rpm beba3d59eb167e557966466e1ffe40d1fd2855ec555023399b5103854e4cf31b libXft-devel-2.3.3-1.el8.aarch64.rpm 7a76e75a6b10501e27c9c68216936fabb5ce4a351121c9a72e059f57ecd48789 libXi-1.7.10-1.el8.aarch64.rpm 16912b941e95518c407e230c8ae0f1cdb7b96a0e8ad4ac5ac401a2f696db442c libXi-devel-1.7.10-1.el8.aarch64.rpm 70c93b1817c4cd61777f886b6dcd0a5dbc1f062061d1c8172b8da89677c9a7d5 libxkbfile-1.1.0-1.el8.aarch64.rpm 0dea8ed7b92f73ab846fa0eb25bcbdedd16f379b2edd88f4b240b3bd7d21ef48 libXmu-1.1.3-1.el8.aarch64.rpm 7d8efb97e0e05f9a27f50ce3142ff7f5ca356a8a565f476d60008a1a22585f80 libXmu-devel-1.1.3-1.el8.aarch64.rpm 043966b9ef97a701308a9a9952c71d233f97ff5f0b5df7ab3d0031dfab672048 libXrandr-1.5.2-1.el8.aarch64.rpm 8652123d8c1cd8afd548e758086467d652217219dfc8c6e22e921d7dc1bedc72 libXrandr-devel-1.5.2-1.el8.aarch64.rpm eb0ea233cf710ce4ac791a03280511e814dfb33c8b5d432b730b0fba718a2958 libXvMC-1.0.12-1.el8.aarch64.rpm 6a64582137ebdb287862f2e005f264ea7b0ac498a394f1feb7337cc7f1f80c88 libXxf86dga-1.1.5-1.el8.aarch64.rpm 059f5abc3d637b313e12f8ddcc501d7ece3d3b8b77a6a22012f3e947809f0b2f libXxf86dga-devel-1.1.5-1.el8.aarch64.rpm 11bab49b2c183720e6c1aff25b7b7d06dc03f2d8db22765bdb16c23fca360857 xorg-x11-drv-ati-19.1.0-1.el8.aarch64.rpm 981aa3e24c43c44e3414157007d00ead30f8b330ad6f0340374bd0eca37e366d xorg-x11-proto-devel-2020.1-3.el8.noarch.rpm aa75375b6709706c2dfeb39934ae46f7e499f9adb176d8e05942ab94584b7556 xorg-x11-xkb-utils-7.7-28.el8.aarch64.rpm fe1130cc5b9fa58b18301460ae14dc755cb455f587f5d043776c0b309031f85f RLSA-2020:4743 Moderate: squid:4 security, bug fix, and enhancement update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467) Security Fix(es): * squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520) * squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521) * squid: Improper input validation in URI processor (CVE-2019-12523) * squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524) * squid: Heap overflow issue in URN processing (CVE-2019-12526) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529) * squid: Denial of service in cachemgr.cgi (CVE-2019-12854) * squid: Buffer overflow in URI processor (CVE-2019-18676) * squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677) * squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678) * squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679) * squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: DoS in TLS handshake (CVE-2020-14058) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.11). (BZ#1829467) Security Fix(es): * squid: Improper input validation in request allows for proxy manipulation (CVE-2019-12520) * squid: Off-by-one error in addStackElement allows for heap buffer overflow and crash (CVE-2019-12521) * squid: Improper input validation in URI processor (CVE-2019-12523) * squid: Improper access restriction in url_regex may lead to security bypass (CVE-2019-12524) * squid: Heap overflow issue in URN processing (CVE-2019-12526) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Out of bounds read in Proxy-Authorization header causes DoS (CVE-2019-12529) * squid: Denial of service in cachemgr.cgi (CVE-2019-12854) * squid: Buffer overflow in URI processor (CVE-2019-18676) * squid: Cross-Site Request Forgery issue in HTTP Request processing (CVE-2019-18677) * squid: HTTP Request Splitting issue in HTTP message processing (CVE-2019-18678) * squid: Information Disclosure issue in HTTP Digest Authentication (CVE-2019-18679) * squid: Mishandled HTML in the host parameter to cachemgr.cgi results in insecure behaviour (CVE-2019-18860) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: DoS in TLS handshake (CVE-2020-14058) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLBA-2020:4747 julietaula-montserrat-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for julietaula-montserrat-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms julietaula-montserrat-fonts-7.200-2.el8.2.noarch.rpm d7014c8bfba50a202864494ab1ce8b7d94d8fecd3b2f6099aee0a80cd8c8661c RLEA-2020:4748 maven:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLSA-2020:4751 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236) Security Fix(es): * httpd: memory corruption on early pushes (CVE-2019-10081) * httpd: read-after-free in h2 connection shutdown (CVE-2019-10082) * httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196) * httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197) * httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: mod_http2 (1.15.7). (BZ#1814236) Security Fix(es): * httpd: memory corruption on early pushes (CVE-2019-10081) * httpd: read-after-free in h2 connection shutdown (CVE-2019-10082) * httpd: null-pointer dereference in mod_remoteip (CVE-2019-10097) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196) * httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197) * httpd: limited cross-site scripting in mod_proxy error page (CVE-2019-10092) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLBA-2020:4752 new packages: gcc-toolset-10-dwz GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-dwz packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-dwz-0.12-1.1.el8.aarch64.rpm d0f8cfabd72f2da0103ec0cd16b8ea928f78a9fc0ac09fd5eb4c97042eff13ca RLBA-2020:4758 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvirt-glib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libvirt-gconfig-3.0.0-1.el8.aarch64.rpm 033b6cead8626e4ffc1859ab5047342c08e1190a1b24d727d55942a3d63b8306 libvirt-glib-3.0.0-1.el8.aarch64.rpm 867498db92005b4b19a976c2dc76ca873681f82e599fd68579a1556e896adb4e libvirt-gobject-3.0.0-1.el8.aarch64.rpm 7b5e08009fa16af1c90fe5be54f895897d91713a6ec7af3ccb9c84d3b0ad3c1f RLEA-2020:4759 new module: ruby:2.7 This enhancement update adds the ruby:2.7 module to Rocky Linux 8. (BZ#1817135) For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:2.7 module to Rocky Linux 8. (BZ#1817135) For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.aarch64.rpm 796c11f0cc7e0d6bff9568c0c195c276755a3acf101e7c7bc95d5ffdfba8e112 rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.aarch64.rpm dd693d8e37d6dde4f0d72425e0a1dd38ec56c0cba528097859af7fc42c5ea0ec rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.aarch64.rpm 843fe8913c91ea33e7f5020c1a6e6a79b56ae281825b4be911cb6a456332704a rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLBA-2020:4770 container-tools:2.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:4771 container-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.aarch64.rpm d9add5e96ce204d4f7f716b84a9fbe0649c3b4e272fd64d4eda675764b1a79f7 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.aarch64.rpm 6e5257c97e3c8a2b8b331e3c2097277a8fb5d9990422577c33a323f8b9569205 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm c2100f07874354a1f304d402844c28f1b6ff8f96c53200c5e59da13c584752d4 container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.aarch64.rpm 2468766f6dbadccbfaf096533d81f7bcd6abb816bbf40d8f00206a173e1cc599 skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm a04c781f8d0becd66616937ac06fee8aa0598eaa6b2239f49b4d6f237a892b91 slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.aarch64.rpm 8410ea43b59b1ed7abd0064ed9f3f0afeda79b41a275ea7c85193b3278ae644a RLBA-2020:4773 libgit2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libgit2-0.26.8-2.el8.aarch64.rpm 6031c8c43bb504b71be1ee1a83af3d4c1deab213aba28a0eb96161d8a3729794 RLBA-2020:4774 langtable bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for langtable. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms langtable-0.0.51-4.el8.noarch.rpm e87cdf437e0d034b54e6033c58433150c339e509d9bfd411e663c727258d05f2 python3-langtable-0.0.51-4.el8.noarch.rpm 4f0e0d4f68336e8e79c5eab94d9ee24fbc08e54affbf456284dde6acaf4d8112 RLBA-2020:4776 new packages: gcc-toolset-10-make GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-make packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-make-4.2.1-1.el8.aarch64.rpm 2e085a4fc7d51657444d82589552940927a13b5d069ae10ee032361b5e457e53 gcc-toolset-10-make-devel-4.2.1-1.el8.aarch64.rpm 8cc7f4feb3007b4b42384ffb0770713cf035373f9f6960dfc9a20bc8cc65004b RLBA-2020:4777 new packages: gcc-toolset-10-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-ltrace packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-ltrace-0.7.91-1.el8.aarch64.rpm dfe5f498fb774fcdbdbff6273819074f082c5017216fd07e62a790ee7147a69c RLBA-2020:4779 ibus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus, ibus-hangul. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ibus-hangul-1.5.1-6.el8.aarch64.rpm bda53a9a6c1b0756421386f5c85ba5ce7f199ea6c11f5773a86eea64d74db530 RLBA-2020:4790 google-noto-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms google-noto-fonts-common-20161022-7.el8.1.noarch.rpm 9054f4115d1f9261a89572c0d14aa2fac5a513f9d5b5baa232bbf3ada845187e google-noto-kufi-arabic-fonts-20161022-7.el8.1.noarch.rpm b8f953ee409ea1f18bba6be030c175e905cc1878fd6132eb95bee3254ea4bf75 google-noto-mono-fonts-20161022-7.el8.1.noarch.rpm d6456554249139c1628f6628c877faf27fc4cea6bfb4f1d6922e2b45339655aa google-noto-naskh-arabic-fonts-20161022-7.el8.1.noarch.rpm 9ddb9ca176cb011dce33f0debbd54047fe668b89150f4bf6494691b1a03b3216 google-noto-naskh-arabic-ui-fonts-20161022-7.el8.1.noarch.rpm 3d453fbc9a239b7c55afd77ce5f6d73a97860abebdfb3eacfab46d1e2400d6f7 google-noto-nastaliq-urdu-fonts-20161022-7.el8.1.noarch.rpm 881fe2872e13de931261e9e52d3b29c9183b73a3bbdb95422a7c30be3bc14483 google-noto-sans-armenian-fonts-20161022-7.el8.1.noarch.rpm 1afdb3c07ba26d67d0463255dfc71c5e316f24bf4fa6adf7e96204a6df097eb6 google-noto-sans-avestan-fonts-20161022-7.el8.1.noarch.rpm 8549d9509bb34983498b2a871584e7861b1b7e5b7620a82c8447c4363c24f8af google-noto-sans-balinese-fonts-20161022-7.el8.1.noarch.rpm 95b38b22969a8afa2d5cf667aa690762eaa35010a1242efd88942739ca463747 google-noto-sans-bamum-fonts-20161022-7.el8.1.noarch.rpm a0beba19c95e5c7bd2879cab9230492780ac0a3bdce3e652cbcf44e2ef7247f1 google-noto-sans-batak-fonts-20161022-7.el8.1.noarch.rpm fa3c4c7e71bfe3e7591412839332f37bf9c3394efefc3e6a8ae00d77b888ee51 google-noto-sans-bengali-fonts-20161022-7.el8.1.noarch.rpm c69876d017c262057100432557a7c11942686cf312c409c333f9451f08bbeed0 google-noto-sans-bengali-ui-fonts-20161022-7.el8.1.noarch.rpm 7f5a4bcfcc4dc9fb88bc4b5bbbbde63cb175053f57de1c0852c56d6eb3d2a76c google-noto-sans-brahmi-fonts-20161022-7.el8.1.noarch.rpm 00f4a158384b075758dae1f14ada89ea6075565c33ebff7238e8c393eb899013 google-noto-sans-buginese-fonts-20161022-7.el8.1.noarch.rpm d9827320d8332b8b441b9cd20c5a2ed1521fa4c2a8c918dbc1f96aece0df195b google-noto-sans-buhid-fonts-20161022-7.el8.1.noarch.rpm 32042bbd855f80ae18b007b4476a93ff5507a11af8b8456183af3eabb2f0c5d5 google-noto-sans-canadian-aboriginal-fonts-20161022-7.el8.1.noarch.rpm eeb8487dc495979dcf179770dbd978be58dbc86d6116f1ab25654a2f23cebed7 google-noto-sans-carian-fonts-20161022-7.el8.1.noarch.rpm 8da9a2b63f21af5205affe22deb41e75e2d5e0fdef9212409c95ad482d7761b6 google-noto-sans-cham-fonts-20161022-7.el8.1.noarch.rpm bb82447e61bcea669eedf3658e612c1c69aad42381b7b6220736ade3a72b46bb google-noto-sans-cherokee-fonts-20161022-7.el8.1.noarch.rpm 74c51fa685d4a7c04f0ea5c4f4ee6abfa1d82a285ec2397403f99c0b62986524 google-noto-sans-coptic-fonts-20161022-7.el8.1.noarch.rpm 4b53d69180d5b24e1594658ccd095129d538661bf0c9def0d37c57ac25710485 google-noto-sans-cuneiform-fonts-20161022-7.el8.1.noarch.rpm 107af3986cd3504d590e8a1896c577d7a488888c09b6dba9d5ad1c04884fb5d2 google-noto-sans-cypriot-fonts-20161022-7.el8.1.noarch.rpm 5a817b07d9267889ffd20abe01c0edcf67d08683885e01bff82ff5baf532297f google-noto-sans-deseret-fonts-20161022-7.el8.1.noarch.rpm 1f99f054d6ccf566e7d7dd287fa2e7e75287ad3c3818d66a2a481be9531c93f2 google-noto-sans-devanagari-fonts-20161022-7.el8.1.noarch.rpm 06f907e62ad60a45e6bdef41c49c0f03f23264c8a7ba3526b25de68646ad6cdf google-noto-sans-devanagari-ui-fonts-20161022-7.el8.1.noarch.rpm d92409e642c58da1b1ae13a173505a765fb7fc3a59dd8b6212fb155d459cfced google-noto-sans-egyptian-hieroglyphs-fonts-20161022-7.el8.1.noarch.rpm b9ca8ce4b2fb1d0a5c91416388fc1715121d1b1800496f09dbd12482c4219f53 google-noto-sans-ethiopic-fonts-20161022-7.el8.1.noarch.rpm 3201e2e34512984a42f9a2166b34147a690a02e38318055ee099d2da9e3e8fd5 google-noto-sans-fonts-20161022-7.el8.1.noarch.rpm f5e5e9f24c260852eea2b74dbba5363d9081d08f74dc4870eeb4874ebc9fbc55 google-noto-sans-georgian-fonts-20161022-7.el8.1.noarch.rpm 05abb9fc5269f05e1e2a2b26a55c4891b0f6625ec1124ec7fe6aae50e8718a78 google-noto-sans-glagolitic-fonts-20161022-7.el8.1.noarch.rpm 606a186eab06888ba297c87e8c43bdfe6531b49feab432d8d53e35fca0641467 google-noto-sans-gothic-fonts-20161022-7.el8.1.noarch.rpm c1218c4756c88a48afa63dbe6239152bfabd1a415432be2ef67b3db41b261372 google-noto-sans-gujarati-fonts-20161022-7.el8.1.noarch.rpm 7301fe98ad704fcf073b2616aa52a4b0bbaec2463bf5406c70e7be03485424ef google-noto-sans-gujarati-ui-fonts-20161022-7.el8.1.noarch.rpm 4f68ad38e8c87c89f57b962263cf5ee62c17fc63bc7e0c7cbeb4deb60b43980b google-noto-sans-gurmukhi-fonts-20161022-7.el8.1.noarch.rpm 9e7b18d8d894e8cb7594ea6523393498a82f3a21f62aca7152bd2b6e014fec5b google-noto-sans-gurmukhi-ui-fonts-20161022-7.el8.1.noarch.rpm 9e56039ba8b27a03b4f98621ab71ab8ff3f3fe119c91c85596f908d908f04874 google-noto-sans-hanunoo-fonts-20161022-7.el8.1.noarch.rpm 828c13f0fce2bfa346fd7d9441c5d2e2cb04dfaea0fa1f789e8cc613e3a4bc7f google-noto-sans-hebrew-fonts-20161022-7.el8.1.noarch.rpm b92f5dd304b9eb29cc7f5250e54eaaf8b3d6e7cd435483c1addc2490ae11ced1 google-noto-sans-imperial-aramaic-fonts-20161022-7.el8.1.noarch.rpm 180f5c232a18e8578bb19660aac3530b2e401c62719ff44c773a060f52804617 google-noto-sans-inscriptional-pahlavi-fonts-20161022-7.el8.1.noarch.rpm d976db0a87a94ea3ba8da7c87f2f04bb2a55422ba79ba8417fb1c440d6ca8208 google-noto-sans-inscriptional-parthian-fonts-20161022-7.el8.1.noarch.rpm fe45186363e56bbd733ad113dfc400b516171d79332d4a1ab0704cf7946a45ab google-noto-sans-javanese-fonts-20161022-7.el8.1.noarch.rpm 6c142a3293c3ae57547a28e51bf01dfdaf997c92adce67de523b56d01e14962e google-noto-sans-kaithi-fonts-20161022-7.el8.1.noarch.rpm aad3715ff21c82d6ca2f9e4ef3182cda585abc76ed152b7b9ddfe127483ea089 google-noto-sans-kannada-fonts-20161022-7.el8.1.noarch.rpm f6eecafd4beea6b4f8445e2f448ee5b2c80838115d8b80d5fccfca60887cda53 google-noto-sans-kannada-ui-fonts-20161022-7.el8.1.noarch.rpm 7c99250cf2026843102512351ba0af21d9b0a3f59d003e5cec1742bbc54e78b0 google-noto-sans-kayah-li-fonts-20161022-7.el8.1.noarch.rpm 60b483a0c9ed8b2f1a20e08c6099d273d38732977488963dd8a7968e7fecf8c3 google-noto-sans-kharoshthi-fonts-20161022-7.el8.1.noarch.rpm cc5156d32dab923a94bedcb901fbd927928d54e101469c17be4cb888ddea846f google-noto-sans-khmer-fonts-20161022-7.el8.1.noarch.rpm d80e9a1fc77297e2862266f8115e7b1089d1dc8e818463d017da8912c8450383 google-noto-sans-khmer-ui-fonts-20161022-7.el8.1.noarch.rpm ddd7809f2d875216c0e522c639c8ea1461f9b184eaad3b5c88876a7fdd6bc612 google-noto-sans-lao-fonts-20161022-7.el8.1.noarch.rpm 0b6f08aac4d4a4232aa2f14482a40e6b333fe85260a68ab338dea88722fb21ab google-noto-sans-lao-ui-fonts-20161022-7.el8.1.noarch.rpm 2924d266d3dab3309f6c91ebdf14fae25d91e5edbe6c592ebe4171313dc41d19 google-noto-sans-lepcha-fonts-20161022-7.el8.1.noarch.rpm 60e73bad8007ef25e98a4eedd5f299c0c3698228728aa329849ba93e39c2f1aa google-noto-sans-limbu-fonts-20161022-7.el8.1.noarch.rpm cd867ab343bd34082155f9af40d1d42446215ee9cf9bbce0ad852d6cd788ec2f google-noto-sans-linear-b-fonts-20161022-7.el8.1.noarch.rpm 70e61c43aefdec1b04c8d84911600adaa5d061fdad6f703a358bd0d96dc8aeaf google-noto-sans-lisu-fonts-20161022-7.el8.1.noarch.rpm 3bd80ea7fdebd7625c81c7b889e99b82f8569f2288fe84cf8741406f3c7ce451 google-noto-sans-lycian-fonts-20161022-7.el8.1.noarch.rpm d56f26d69b432891d45ed7e8efa760c544ba4b993f48bd079c812790840bbcb8 google-noto-sans-lydian-fonts-20161022-7.el8.1.noarch.rpm 924fecc774847165e8482fd6f4a77003dba7099f80f7f18129a9f4888b0e1715 google-noto-sans-malayalam-fonts-20161022-7.el8.1.noarch.rpm 596a7997a9ba17df887547c705e7a694d2d99e4d1dfcefcb37ee8ef6c2a0cda1 google-noto-sans-malayalam-ui-fonts-20161022-7.el8.1.noarch.rpm b3bc779d1a6086f006fd5504fa465e8fd1d6fb7abdf26c44ae3991fbf3e2d115 google-noto-sans-mandaic-fonts-20161022-7.el8.1.noarch.rpm 43c39a98a28d9d95861800197ddc7e72ee5f430dcf4de6d8ed53e96f0aafc59c google-noto-sans-meetei-mayek-fonts-20161022-7.el8.1.noarch.rpm 5d80de8a140f4ff37d56978f5b6a698534fff3f46e4359c8225153e3dcc8d26f google-noto-sans-mongolian-fonts-20161022-7.el8.1.noarch.rpm 47ba6e340ec2de58d3fc5c698f7a6046a67446b7d5b238ccf09f833c48597dd1 google-noto-sans-myanmar-fonts-20161022-7.el8.1.noarch.rpm 78440d1722a5f7daaa95e4c302ab2d97739ac385968fbe85be5d7698ed363519 google-noto-sans-myanmar-ui-fonts-20161022-7.el8.1.noarch.rpm 1f327ecc610b021068746659a6a1a84d09fa5f4c50721b88223d4525b46b0a94 google-noto-sans-new-tai-lue-fonts-20161022-7.el8.1.noarch.rpm 718eed1d2f470e024b6994bdf80d5265ae659d228c46c2699826540031944848 google-noto-sans-nko-fonts-20161022-7.el8.1.noarch.rpm 7f35fbc6e542114c530841d076696a43b4879c38cb820045f5a388714fd9159a google-noto-sans-ogham-fonts-20161022-7.el8.1.noarch.rpm 1ceb4a4a1ad86f2b3c8987da6e5881118ae372f7f7da1b5698719a90156031df google-noto-sans-ol-chiki-fonts-20161022-7.el8.1.noarch.rpm 577fa59a3bd3b5653a44fc6ad111649d97c9f8fc69893b9808257e16ff8328f2 google-noto-sans-old-italic-fonts-20161022-7.el8.1.noarch.rpm e7059bf126c5bdfe66fc4dc27414cfabbb42a32c00f246e3d44d5b4cb1a3e66e google-noto-sans-old-persian-fonts-20161022-7.el8.1.noarch.rpm 36f7d58ad130d8886a5afdcc5a6a1c27ae32044d4224d7ff23f9ff4ca6c47bb7 google-noto-sans-old-south-arabian-fonts-20161022-7.el8.1.noarch.rpm 5146b3f7f9f7617ca1b85ec2e8ec3541d6dc21de917e578492f1a1a1614e6984 google-noto-sans-old-turkic-fonts-20161022-7.el8.1.noarch.rpm 78a54f8247040e17bd0ca4436f8f97780cb7ef8d0da7865fa0329943f056822e google-noto-sans-oriya-fonts-20161022-7.el8.1.noarch.rpm f4711424620ba201d257c9f8e0cab655a467e8a0016df3ec6465baf14287464d google-noto-sans-oriya-ui-fonts-20161022-7.el8.1.noarch.rpm 549382c75c021ab8bb71cdd4d591e75effeb71d26cdbbedf606d6a292c4a7963 google-noto-sans-osmanya-fonts-20161022-7.el8.1.noarch.rpm 462080e011048f6cd91e785c20e2d58a2bdbfbec20909f0ab49fdd9ce4c36cef google-noto-sans-phags-pa-fonts-20161022-7.el8.1.noarch.rpm 1654e2bf83c0009fd6f7492b6d3194bd05b0a81caa15ba1260d631547988538d google-noto-sans-phoenician-fonts-20161022-7.el8.1.noarch.rpm de9a02ab3108811c9ada8442977a0e6e27b17aebd05e57b4bd1bf4d0a89bc40a google-noto-sans-rejang-fonts-20161022-7.el8.1.noarch.rpm 86ecdff8779c5d2c47bf53bb962bc7ce15b0f257e1969ddd05c9419e25dc7ab0 google-noto-sans-runic-fonts-20161022-7.el8.1.noarch.rpm de7b23e118d889218329e95180fba6f5ee55fa32f1d46c4759edd7b3aa4c1f1e google-noto-sans-samaritan-fonts-20161022-7.el8.1.noarch.rpm c013cff0f199664040aa90b4bfbcd44ab0cd8f376a03f82bd9c2c6fe4ffd5a10 google-noto-sans-saurashtra-fonts-20161022-7.el8.1.noarch.rpm 2a162ead4e35e933fb9030df85f577c0f9daf9edbfeef8d8656b96ddcec399ed google-noto-sans-shavian-fonts-20161022-7.el8.1.noarch.rpm 1a722c9b472ef029e6924b8bf2f49f3a0fa5d9210ab5ef72ef8dbadf910798df google-noto-sans-sinhala-fonts-20161022-7.el8.1.noarch.rpm 732241415064377ba25a40b26b468fcbd73f2ef7d25d1a093004b6fad929d4db google-noto-sans-sundanese-fonts-20161022-7.el8.1.noarch.rpm 1b4041239d8d3a655a67c0afbe53224a59c95a523d8c619c1f920ae90df67eb8 google-noto-sans-syloti-nagri-fonts-20161022-7.el8.1.noarch.rpm e1d3b6bfe8c0808e5861fff22295a9353229fc9b8b1045089efc61994e0a0b4e google-noto-sans-symbols-fonts-20161022-7.el8.1.noarch.rpm 445f9a3ba6837607d3da06a1621d8058732aa9a0b72238632e4cf0d3641654a7 google-noto-sans-syriac-eastern-fonts-20161022-7.el8.1.noarch.rpm f4aeef574633a828f0d0046127b4eb11476275ab17d3161c713e46f289b78e5e google-noto-sans-syriac-estrangela-fonts-20161022-7.el8.1.noarch.rpm 2ec396f9d6b7daab1d326cb557f71bcb8b5fd6fbf26ababcf39e9510b91f189a google-noto-sans-syriac-western-fonts-20161022-7.el8.1.noarch.rpm 9bcf761f2a6b6515a4924697066dd10589d9860f248b520bb6765f1e5e791422 google-noto-sans-tagalog-fonts-20161022-7.el8.1.noarch.rpm 9513c313ac8baed19701397705eb80df22d453eb3ff7fee09daff328618ba8f7 google-noto-sans-tagbanwa-fonts-20161022-7.el8.1.noarch.rpm a320e1a5e5f4c4ddc9ad6c4bedd14790803e3203ab3497ee53e976e23638d4d0 google-noto-sans-tai-le-fonts-20161022-7.el8.1.noarch.rpm 0eddb4c72b753720d0cd41326aa32330f9264c5aaa4ed02ec2b50deb15988419 google-noto-sans-tai-tham-fonts-20161022-7.el8.1.noarch.rpm de23ad42f12dcde951a9ed2a9b2c8b2744a923ffe88f9e57588c59f0ef010e22 google-noto-sans-tai-viet-fonts-20161022-7.el8.1.noarch.rpm 36eead07805038f4f99a65d343ff728f3efa039432f3aab225a0896daaa07554 google-noto-sans-tamil-fonts-20161022-7.el8.1.noarch.rpm 2124b988ddc384ad951e6b582ffa4d151f46ef1fe86c2b3ea40e8217386d9506 google-noto-sans-tamil-ui-fonts-20161022-7.el8.1.noarch.rpm 8b662de72aa6d9f2512b93491ba95a1790d77266afda7fb0c3669146b02795b0 google-noto-sans-telugu-fonts-20161022-7.el8.1.noarch.rpm f461e093f472a9c7d1d1b6c2116e44ff41a2c2790eea193f201ce890817eef08 google-noto-sans-telugu-ui-fonts-20161022-7.el8.1.noarch.rpm 891ce2398cde591c82445b719e1ea9d7e90f8f6c7291f49c03efe6cc59d7d796 google-noto-sans-thaana-fonts-20161022-7.el8.1.noarch.rpm bf2bcd66091bafc88dc301f2ff0f4081f4ab3a80c21ff817d84ef6f527591e99 google-noto-sans-thai-fonts-20161022-7.el8.1.noarch.rpm 5c9f0078b7c5bc0e7c0811ad90949d361ac778b4657784258a6321c692a7b39a google-noto-sans-thai-ui-fonts-20161022-7.el8.1.noarch.rpm a6b013bc3f194c2c1f3bcddb01bdfa3c70eddec2b59c4923243400cde5e0f6cd google-noto-sans-tibetan-fonts-20161022-7.el8.1.noarch.rpm 7c749e6c13864fbf2f123062dbf078edc7bb4a086dc6f6f8bbcd5a470f8868ab google-noto-sans-tifinagh-fonts-20161022-7.el8.1.noarch.rpm d73b184e3ac70dcef918d04f6d71d732c669f3e7650bf1d9eb609bae557eb04a google-noto-sans-ugaritic-fonts-20161022-7.el8.1.noarch.rpm c2b23c6ef16b4449d292788dffa8ec4330a495a3400f2bd55b5a1bffec9f0afb google-noto-sans-ui-fonts-20161022-7.el8.1.noarch.rpm 3c2f8335cfd198916a192f431b8714a63370b80de5c4f11cf57f172c74c014e9 google-noto-sans-vai-fonts-20161022-7.el8.1.noarch.rpm 47d6ea20f593be3893dc23c6ef20adb49325fa534890049bac9cc70ed745ba61 google-noto-sans-yi-fonts-20161022-7.el8.1.noarch.rpm e602ac52168ec2649b85e01b2307f7f6888c6468dfd2cf28610d76e5a47d5eec google-noto-serif-armenian-fonts-20161022-7.el8.1.noarch.rpm 316d0b9104eb7df90cf05316a8549694a5ccc3eca1fa6f2d3b408d22017518c5 google-noto-serif-bengali-fonts-20161022-7.el8.1.noarch.rpm f975618990610842d350d936dcddcb18d49987d1c937bf7d759d85f713606e3d google-noto-serif-devanagari-fonts-20161022-7.el8.1.noarch.rpm 33a22bc760dc6e333b85008cbd9a54fda9185af5bf81d3dd51c88ad49460c75d google-noto-serif-fonts-20161022-7.el8.1.noarch.rpm bc2a72c11edfd2ffbb662adaf6e45ccc00ce8d6b8e2253b1419b64376073a891 google-noto-serif-georgian-fonts-20161022-7.el8.1.noarch.rpm 88370f2a2e7e9056e2838a2c6a503a79ec8496658c4a91993ed076f548c172f6 google-noto-serif-gujarati-fonts-20161022-7.el8.1.noarch.rpm a9780ebb04e2462dbc9ab3335edeb8068542131fb47ae73ab1033b81cdbef847 google-noto-serif-kannada-fonts-20161022-7.el8.1.noarch.rpm ad7511bdf37887e2327234151c9e7e350ea734dfde715c0836c0494fd66dc878 google-noto-serif-khmer-fonts-20161022-7.el8.1.noarch.rpm 633bd366630acc49451b90027b3e1891e01e97c2dd7e5763ec2d8ea19dcaa42c google-noto-serif-lao-fonts-20161022-7.el8.1.noarch.rpm 16b575e7835dba5057a82708e1cabd30340d51d237250dd3cd725f5a995b0b16 google-noto-serif-malayalam-fonts-20161022-7.el8.1.noarch.rpm dc01c2d61bfe5fa43a2c0fd5e8453c1da1922f5f08a905f566baa9abd3a9229e google-noto-serif-tamil-fonts-20161022-7.el8.1.noarch.rpm 26adb2a3043264f623e3b8056aeebfb7b5518e9507fcb7f8ba21c21f08282f60 google-noto-serif-telugu-fonts-20161022-7.el8.1.noarch.rpm 26e9e20667b482fc729cf245e916c81eb1a77165f6e963290e2854eee2a2dd67 google-noto-serif-thai-fonts-20161022-7.el8.1.noarch.rpm a1de6ac7f1c39cbf49e15668260901a0f8fd1337a0a3931477bbe6d2976cb4ef RLBA-2020:4792 omping bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for omping. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms omping-0.0.4-18.el8.aarch64.rpm 9091ad1085457a051b75e40a6d655f795ed5b07e24b75685524a29e5f9271e85 RLBA-2020:4795 rpmlint bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpmlint. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rpmlint-1.10-14.el8.noarch.rpm 4c1a93528d02390318976858c4daa1a77cf258c69c5d1e80b75f443544e53672 RLBA-2020:4798 python-justbases bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-justbases, python-justbytes. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-justbases-0.14-4.el8.noarch.rpm e194b11631a284bf9f7ece9b2fba00f1748bffcbcf540a6c943c4d8445c31e1a python3-justbytes-0.14-2.el8.noarch.rpm cac2a8bcd4ef610d9498f194540f62c4ded2894080b4396d01f44f73609c1b70 RLEA-2020:4803 perl:5.30 metadata for the Rocky Linux 8 module matrix (3/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 RLBA-2020:4824 ruby:2.5 bug fix update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.aarch64.rpm d6e83db1ed53961b708866292cbcde971a111734e3b552032fcb204101e1dfdc rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLSA-2020:4827 Moderate: oniguruma security update Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for oniguruma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms oniguruma-6.8.2-2.el8.aarch64.rpm e5dd274e09b5b06c9324c739a9e867888e05325aed642ff21899829508bc2db6 RLBA-2020:4828 rpmdevtools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpmdevtools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rpmdevtools-8.10-8.el8.noarch.rpm 35b7558165c1564c655fba49a8acf0d03ed7c361d0dcde47cf85740e052c46b9 RLBA-2020:4832 torque bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for torque. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms torque-libs-4.2.10-25.el8.aarch64.rpm ae8241357e5495e2c6b1acc3b4db30dd9c6d9eec4e7dd72870895b69cc8c2f88 RLBA-2020:4834 new packages: gcc-toolset-10-systemtap GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-9-gcc-9.2.1-2.3.el8.aarch64.rpm eb82d44122aae17fb51cbfd12c3a8449fbe2db2460aaf2b0576934350df23a13 gcc-toolset-9-gcc-c++-9.2.1-2.3.el8.aarch64.rpm c6fc1d362254da8990e141d0e4a4de7c1feb9f558ab1a0eeb969678e7c72edbd gcc-toolset-9-gcc-gdb-plugin-9.2.1-2.3.el8.aarch64.rpm eccf039883c2a017667c38d44e7073113c9a77d37de757ea98426809aa182de4 gcc-toolset-9-gcc-gfortran-9.2.1-2.3.el8.aarch64.rpm e0de7e2a3a30ca1efbaeb7acbdd7e4afdae517497cae1aabd60dd1b4c5d30684 gcc-toolset-9-libasan-devel-9.2.1-2.3.el8.aarch64.rpm 3349dc342e81972d292c4a42832f362d66751f8e6a2b6bdcb122dfbe6019b96f gcc-toolset-9-libatomic-devel-9.2.1-2.3.el8.aarch64.rpm eb9edd0abfed98b2ebbc920358c4a9a896ad9c83374c488e9d2ff3aaf5fc40b1 gcc-toolset-9-libitm-devel-9.2.1-2.3.el8.aarch64.rpm b5955bd2805d7ea2050471ef40637ff41e98b95b2dc2a02c94dc31aed045499e gcc-toolset-9-liblsan-devel-9.2.1-2.3.el8.aarch64.rpm 3428347c9c4aaade50d1924ffa19dd1337fbe3e221d15f317fa61a92cc281131 gcc-toolset-9-libstdc++-devel-9.2.1-2.3.el8.aarch64.rpm 64588860a80e2fda928f7c536b6f489f0618e3f8c72d1b53075d5d8b6a499c13 gcc-toolset-9-libstdc++-docs-9.2.1-2.3.el8.aarch64.rpm fc447dc723f840409599302881e5ad84a650f8262a047f76e55f8e7786523576 gcc-toolset-9-libtsan-devel-9.2.1-2.3.el8.aarch64.rpm f99d669a08fe72cac12baae1f6876db104be4ae5f7ccd311d3a1eecf1eb5cbc6 gcc-toolset-9-libubsan-devel-9.2.1-2.3.el8.aarch64.rpm c5f1ae6d08612112bde3a318dc0cb3a6e6a5c5641d35c3399a0531b4643a0faa RLBA-2020:4857 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * nsslapd-db-locks patching no longer works (BZ#1882472) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * nsslapd-db-locks patching no longer works (BZ#1882472) rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLBA-2020:4859 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.conf (BZ#1886443) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLEA-2020:5101 nodejs:14 bug fix and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.0). (BZ#1891809) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.0). (BZ#1891809) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2020:5393 Important: libexif security update The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libexif. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libexif-0.6.22-5.el8_3.aarch64.rpm 313a2e00e8da173c652f4b8c4befaf8144e0bfed1ee02911eb0bd4a9469c0711 RLBA-2020:5494 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2020:5496 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898204) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-podman-api, libslirp, toolbox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898204) rocky-linux-8-aarch64-appstream-rpms__container-tools libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 RLBA-2020:5497 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898251) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * update description and summary for container-tools module for 8.3.0 (BZ#1898251) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2020:5498 container-tools:1.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.aarch64.rpm d9add5e96ce204d4f7f716b84a9fbe0649c3b4e272fd64d4eda675764b1a79f7 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.aarch64.rpm 6e5257c97e3c8a2b8b331e3c2097277a8fb5d9990422577c33a323f8b9569205 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm c2100f07874354a1f304d402844c28f1b6ff8f96c53200c5e59da13c584752d4 container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.aarch64.rpm 2468766f6dbadccbfaf096533d81f7bcd6abb816bbf40d8f00206a173e1cc599 skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm a04c781f8d0becd66616937ac06fee8aa0598eaa6b2239f49b4d6f237a892b91 slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.aarch64.rpm 8410ea43b59b1ed7abd0064ed9f3f0afeda79b41a275ea7c85193b3278ae644a RLSA-2020:5499 Moderate: nodejs:12 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:12 on aarch64 (BZ#1901045) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:12 on aarch64 (BZ#1901045) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2020:5500 Important: mariadb:10.3 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086) Security Fix(es): * mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180) * mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938) * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765) * mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789) * mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009) * Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017) * Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021) * There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086) Security Fix(es): * mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (CVE-2020-15180) * mysql: InnoDB unspecified vulnerability (CPU Oct 2019) (CVE-2019-2938) * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2760) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: InnoDB unspecified vulnerability (CPU Apr 2020) (CVE-2020-2814) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14765) * mysql: InnoDB unspecified vulnerability (CPU Oct 2020) (CVE-2020-14776) * mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) (CVE-2020-14789) * mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) (CVE-2020-14812) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * FTBFS: -D_GLIBCXX_ASSERTIONS (BZ#1899009) * Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1 (BZ#1899017) * Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstrap (BZ#1899021) * There are undeclared file conflicts in several mariadb and mysql packages (BZ#1899077) rocky-linux-8-aarch64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a RLSA-2020:5503 Moderate: mariadb-connector-c security, bug fix, and enhancement update The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases. The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993) Security Fix(es): * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Code utilizing plugins can't be compiled properly (BZ#1899001) * Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005) * Replace hard-coded /usr with %{_prefix} (BZ#1899099) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mariadb-connector-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The MariaDB Native Client library (C driver) is used to connect applications developed in C/C++ to MariaDB and MySQL databases. The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11). (BZ#1898993) Security Fix(es): * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2922) * mariadb-connector-c: Improper validation of content in a OK packet received from server (CVE-2020-13249) * mysql: C API unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Code utilizing plugins can't be compiled properly (BZ#1899001) * Add "zlib-devel" requirement in "-devel" subpackage (BZ#1899005) * Replace hard-coded /usr with %{_prefix} (BZ#1899099) rocky-linux-8-aarch64-appstream-rpms mariadb-connector-c-3.1.11-2.el8_3.aarch64.rpm 646834aa264f51747601bf1a7f7f830e1bbf33f41cd2f81f6f154b4c072065f9 mariadb-connector-c-config-3.1.11-2.el8_3.noarch.rpm a766f0f5d7ca81d2cf761edfe23b15e847daca41579928bf6789f950478d3f41 mariadb-connector-c-devel-3.1.11-2.el8_3.aarch64.rpm a42edb5da4707bbcec29ec48548562aca03f8180a925ee6c7f12577e737e024f RLSA-2020:5620 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.5). Security Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349) * postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350) * postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696) * postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.5). Security Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: Uncontrolled search path element in logical replication (CVE-2020-14349) * postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350) * postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696) * postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLSA-2021:0507 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Remote unauthenticated denial of service in mod_authz_svn (CVE-2020-17525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 RLSA-2021:0531 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for udica, toolbox, python-podman-api, libslirp, oci-seccomp-bpf-hook, slirp4netns, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API (CVE-2020-14370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:0542 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * qemu-ga aborts after guest-shutdown command (BZ#1900578) * Report logical_name for disks without mounted file-system (BZ#1913818) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * qemu-ga aborts after guest-shutdown command (BZ#1900578) * Report logical_name for disks without mounted file-system (BZ#1913818) rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2021:0546 container-tools:2.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec is fragile in the presence of signals (BZ#1913294) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * podman exec is fragile in the presence of signals (BZ#1913294) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2021:0547 idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * IPA WebUI inaccessible after upgrading to Rocky Linux 8.3.- idoverride-memberof.js missing (BZ#1895910) * IPA should handle situations where krb5 library breaks FAST armoring with referrals (BZ#1914821) * ipa-kdb: support subordinate/superior UPN suffixes (BZ#1914823) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * IPA WebUI inaccessible after upgrading to Rocky Linux 8.3.- idoverride-memberof.js missing (BZ#1895910) * IPA should handle situations where krb5 library breaks FAST armoring with referrals (BZ#1914821) * ipa-kdb: support subordinate/superior UPN suffixes (BZ#1914823) rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2021:0548 Moderate: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.23.1). Security Fix(es): * libuv: buffer overflow in realpath (CVE-2020-8252) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * npm: sensitive information exposure through logs (CVE-2020-15095) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.23.1). Security Fix(es): * libuv: buffer overflow in realpath (CVE-2020-8252) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-dot-prop: prototype pollution (CVE-2020-8116) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * npm: sensitive information exposure through logs (CVE-2020-15095) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs-yargs-parser: prototype pollution vulnerability (CVE-2020-7608) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:0549 Moderate: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3). Security Fix(es): * nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746) * nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3). Security Fix(es): * nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746) * nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:0551 Moderate: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.15.4). Security Fix(es): * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:14 on aarch64 (BZ#1916465) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.15.4). Security Fix(es): * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277) * nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * yarn install crashes with nodejs:14 on aarch64 (BZ#1916465) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:0611 Important: xterm security update The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xterm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms xterm-331-1.el8_3.2.aarch64.rpm aff8f573786e9c7a44200bcd56dc039849e3f80da4864704c721ae00f59cea85 xterm-resize-331-1.el8_3.2.aarch64.rpm 90b67a9edd9c1406e73011ceb62f6f80ed5786a2d6454722c0e032750a46b5b4 RLSA-2021:0705 Important: container-tools:1.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, oci-umount, runc, podman, skopeo, slirp4netns, oci-systemd-hook, containernetworking-plugins, buildah, criu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.aarch64.rpm d9add5e96ce204d4f7f716b84a9fbe0649c3b4e272fd64d4eda675764b1a79f7 containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.aarch64.rpm 6e5257c97e3c8a2b8b331e3c2097277a8fb5d9990422577c33a323f8b9569205 containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm c2100f07874354a1f304d402844c28f1b6ff8f96c53200c5e59da13c584752d4 container-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm a7da4cbd96f6987942c344c726c4029e630b43721942ecd9bebe9c246f0fb24f crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.aarch64.rpm e81cff2e59bf58ae590043942329fb968480242c70caf43e151fd9939600061f oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.aarch64.rpm f2cea16f270b33a4e949b8d40c2726cac5baf2c5a6cea6c59079b65401cc175e oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.aarch64.rpm d8cab1aeeb517a51de3cb04d946de0bc9edee93a9f97088d3061e1e5a4b52078 podman-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.aarch64.rpm db4d7f98b931ce3dcbffcc5eb91665394ca58de490029a90d1b683f40f092086 podman-docker-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.noarch.rpm be8182cafbea4dc23e96a23c5ba0369a54ad19f7e5343dc0d03b309e85a126e0 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca runc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.aarch64.rpm 2468766f6dbadccbfaf096533d81f7bcd6abb816bbf40d8f00206a173e1cc599 skopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.aarch64.rpm a04c781f8d0becd66616937ac06fee8aa0598eaa6b2239f49b4d6f237a892b91 slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.aarch64.rpm 8410ea43b59b1ed7abd0064ed9f3f0afeda79b41a275ea7c85193b3278ae644a RLSA-2021:0706 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: container users permissions are not respected in privileged containers (CVE-2021-20188) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2021:0711 Important: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privileged host device access from guest (CVE-2020-35517) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2021:0734 Important: nodejs:12 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.21.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.21.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:0735 Important: nodejs:10 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.24.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.24.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-10.24.0-1.module+el8.3.0+101+f84c7154.aarch64.rpm c5406e8554da9e3f2bf9c5509a34c0f119d13eeadbda7dc3c55bf0a6dc976239 nodejs-devel-10.24.0-1.module+el8.3.0+101+f84c7154.aarch64.rpm 5f4c88385eb277ac0d34acbf2be9ec48affc4300bc6329736a03316aa9dabfbe nodejs-docs-10.24.0-1.module+el8.3.0+101+f84c7154.noarch.rpm 14e41f41751e32d29c7dcb89d504e776e064e7d3871dc2342d38c7a933043bda nodejs-full-i18n-10.24.0-1.module+el8.3.0+101+f84c7154.aarch64.rpm 3e9b9c80b225c12d28fc30d798c36069f49d456c82e537de11d00ca4810fe62d nodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm 31e1e988057321adabb3e84a572d2804c22400654eebaa7c2534924127a56afe nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c npm-6.14.11-1.10.24.0.1.module+el8.3.0+101+f84c7154.aarch64.rpm 8e3132e1316a575aa877f6fcf300b273b540c4472c3b5f0e1bf796e04b6dd7df RLSA-2021:0744 Important: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.16.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Node.js should not be built with "--debug-nghttp2" (BZ#1932427) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.16.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Node.js should not be built with "--debug-nghttp2" (BZ#1932427) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:1064 Moderate: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, netcf, perl-Sys-Virt, seabios, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: Regression of CVE-2020-10756 fix in virt:Rocky Linux/qemu-kvm in Rocky Linux 8.3 (CVE-2021-20295) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2021:1083 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * IPA krb5kdc crash possible doublefree ipadb_mspac_struct_free finish_process_as_req (BZ#1930562) * krb5kdc is crashing intermittently on IPA server (BZ#1935146) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-jwcrypto, custodia, python-qrcode, python-yubico, python-kdcproxy, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * IPA krb5kdc crash possible doublefree ipadb_mspac_struct_free finish_process_as_req (BZ#1930562) * krb5kdc is crashing intermittently on IPA server (BZ#1935146) rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 RLSA-2021:1242 Important: mariadb:10.3 and mariadb-devel:10.3 security update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for Judy, asio, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a RLSA-2021:1744 Moderate: sane-backends security update Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers). Security Fix(es): * sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sane-backends. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scanner Access Now Easy (SANE) is a universal scanner interface. The SANE application programming interface (API) provides standardized access to any raster image scanner hardware (for example, flatbed scanners, hand-held scanners, video and still cameras, and frame-grabbers). Security Fix(es): * sane-backends: NULL pointer dereference in sanei_epson_net_read function (CVE-2020-12867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sane-backends-daemon-1.0.27-22.el8.aarch64.rpm 961cd90af1e3bae0a235d05845bd166a0d78eb587a8166bdf0faf0ff525ede40 sane-backends-1.0.27-22.el8.aarch64.rpm 3a372e15e9b0df695527761caace1aa2f36536ffa72fbc17e82d94ca00636c44 sane-backends-devel-1.0.27-22.el8.aarch64.rpm 528a379e88b261427a07e45fe9fe3cb39bb274288f81f8cdbe1930f3e9836a7a sane-backends-doc-1.0.27-22.el8.noarch.rpm c2bca9ba6c3a187210c85521c811eb69c39a4b34188789c94692f4214e0a1655 sane-backends-drivers-cameras-1.0.27-22.el8.aarch64.rpm bb4046e08195300d1a6fc0bfcb1e3ec0d8377c679d2c257a75072326bdceb209 sane-backends-drivers-scanners-1.0.27-22.el8.aarch64.rpm f70c7ecd81308c3959707ccae1107372b2b2caaa5735888f588c7a27278ad8b8 sane-backends-libs-1.0.27-22.el8.aarch64.rpm 21c077af20935c432f38beed30d6760487a6cbdb16c39d9e73819f6e57eed18d RLBA-2021:1750 gcc-toolset-10 bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-10.1-0.el8.aarch64.rpm 5ad61320cddd10113ae399131f1a02f90a0676ec4c86042d016b0b4ed9381e6d gcc-toolset-10-build-10.1-0.el8.aarch64.rpm 596f47a803808fadc2589c45587b27b36a67f99818148237e2b4f6e75f9de5ae gcc-toolset-10-perftools-10.1-0.el8.aarch64.rpm 0af2d793a6979f4e43366de125b308a296c5437f033918f96a58a2cbb6376e4d gcc-toolset-10-runtime-10.1-0.el8.aarch64.rpm b7c586eddac1b4ad18422305af84479dfcc4fe2d11a8bf45f6527ef376e472d1 gcc-toolset-10-toolchain-10.1-0.el8.aarch64.rpm c409db47f9d816a98836925f80b5881cd075a2e368a2581aa3bef083455bd86e RLEA-2021:1755 new module: swig:4.0 The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces. This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for swig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The simplified wrapper and interface generator (SWIG) is a software development utility to connect C, C++, and Objective C programs with a variety of high-level programming languages. SWIG is used to create high-level interpreted programming environments, systems integration, and as a utility for building user interfaces. This enhancement update adds the swig:4.0 module to Rocky Linux 8. (BZ#1853639) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__swig swig-4.0.2-3.module+el8.4.0+386+8a292e6f.aarch64.rpm 590be285c516a46fa2343c8b8d8ca5b9bdcbb02909bad672d7719baf6842c2d3 swig-doc-4.0.2-3.module+el8.4.0+386+8a292e6f.noarch.rpm 5468f8ba21746e1be94f3d85d8a6366e88bf3a51e140c301eb5cd7464f503fba swig-gdb-4.0.2-3.module+el8.4.0+386+8a292e6f.aarch64.rpm a1d01282ddd51b13ed3501f8b444a6cea8adb712e53c6abbe3db911eb836d8be RLBA-2021:1760 libmpc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libmpc-1.1.0-9.1.el8.aarch64.rpm fc5b48b17d351301c4eda808ca45f27c2777ec75684be470d4ebf9fca67300bd libmpc-devel-1.1.0-9.1.el8.aarch64.rpm f4215ba30a860e1dc87fdcb0cf93a6a3e9bb98ac9210a42e248648629b35dad2 RLSA-2021:1761 Moderate: python27:2.7 security and bug fix update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python27 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.aarch64.rpm 94a0af7667b29e361371ee000dac383c0357ad911906b27cb67fd8dcba2fd03b python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 8ccedb9b6934da4f44a44b8ed26c88a3b500efd518f2e23919955b3174b1c7bd python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 82618850ed681c3fb6f5b3c8911b7d924149cf73687bfc5a69ee9cfef1b3108f python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.aarch64.rpm a09b0362a51a0d1e18fe75ed1833a38d34930603682d48fabe7df8d84216b822 python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLSA-2021:1762 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637) * QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) * QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707) * QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916) * QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637) * QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c (CVE-2020-27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure (CVE-2020-11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) * QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c (CVE-2020-25707) * QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c (CVE-2020-25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE-2020-28916) * QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets (CVE-2020-29129, CVE-2020-29130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2021:1765 brltty bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for brltty. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms brltty-at-spi2-5.6-32.el8.aarch64.rpm da1498b2f1407fd26f157e5d8859572e8040fd46205e07bf146584fa35432471 brlapi-0.6.7-32.el8.aarch64.rpm 268bc456c2a90737b9b42964a618f57858f005e7c2940414ab2e94a4fd7d9d32 brlapi-java-0.6.7-32.el8.aarch64.rpm bd4ebd4a54cd07c851a7a8bb658925c1fdb77dd8e3a6368e8a4b6ee155b3998e brltty-5.6-32.el8.aarch64.rpm 28d2ee1716a2f1b53b5583568820dde1e6763fa2d0a76170f0215e604ba4c1d0 brltty-docs-5.6-32.el8.noarch.rpm 5ec25c600859daf510d637ea02a0e14ce5d78362ecc8de1f57abc300280210a5 brltty-dracut-5.6-32.el8.aarch64.rpm 16fc14ed82ac54739118535c4c8b06ad5464b32ac81594035298de42ae25aeca brltty-espeak-ng-5.6-32.el8.aarch64.rpm 1b6a8dd20c7e3c20a70122fc098b463a84a5cc702565fc18aa9687333565f7b3 brltty-xw-5.6-32.el8.aarch64.rpm 7d7801afc5213fcc343131f864f44277afabff44f839a8cf4109255b97a4bb9b python3-brlapi-0.6.7-32.el8.aarch64.rpm 7fcc0ee74332fc89bff4ad1710726bed1346b3c7077d90fc3970ec0aa1741dc3 tcl-brlapi-0.6.7-32.el8.aarch64.rpm 39a38c0c5c4cb75315e9d99bd4a2f8d97dcce966c5119755ba9fcfdc19e3d97b RLSA-2021:1775 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm 92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 RLEA-2021:1779 libreoffice bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liborcus, libnumbertext. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libnumbertext-1.0.6-2.el8.aarch64.rpm b8419cea518c8b4497589a6313adbdda4ce0005f94b47880dc44eba019ad04e7 RLSA-2021:1789 Moderate: gssdp and gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gssdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gssdp-1.0.5-1.el8.aarch64.rpm d2338a1621401a859d1a8d6f3f8f76d643707b2e28779ff39dba31ecfbe53148 RLBA-2021:1790 ibus-libpinyin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-libpinyin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ibus-libpinyin-1.10.0-2.el8.aarch64.rpm e5596d588efd6d43ac0b48eb3dc86008b9f7fb2e3db2aee8f98e2be005e80dfc RLBA-2021:1793 pyOpenSSL bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyOpenSSL. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pyOpenSSL-19.0.0-1.el8.noarch.rpm 1cf5962508446261b2aa4b02dd687be8bb82191c25494216ea605e8af1931511 RLSA-2021:1796 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) * podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) * podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:1799 telnet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for telnet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms telnet-0.17-76.el8.aarch64.rpm 137be83c517431e39dd3691ad14420093dfefacdc2e94ff0a4463d25bfc9cf53 telnet-server-0.17-76.el8.aarch64.rpm 338ff7160059ef56967abdba8ea0b030b4846696bb461bf49e59fe47a2eb2e1a RLBA-2021:1802 gnome-bluetooth bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-bluetooth. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-bluetooth-3.34.3-1.el8.aarch64.rpm d5e9842029143f0bbb788b48add7d1c24f15a9e5d06cd4b34f1e2bd7d6fff4d1 gnome-bluetooth-libs-3.34.3-1.el8.aarch64.rpm fbd0350141a1b8c008dc5be119dc9b33fa5ddd1b2725e05ff12bad06531631e8 RLSA-2021:1804 Moderate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips. The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655) Security Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362) * libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * libX11: Heap overflow in the X input method client (CVE-2020-14344) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libwacom, xorg-x11-drivers, libX11, mesa, libinput, libdrm, libglvnd, xorg-x11-server, egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips. The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655) Security Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362) * libX11: Integer overflow leads to double free in locale handling (CVE-2020-14363) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * libX11: Heap overflow in the X input method client (CVE-2020-14344) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xorg-x11-drivers-7.7-30.el8.aarch64.rpm 5cb1588a37da8cfa3e8946bf851f1c3cc900de2fa2140fce2d222163f9370ce6 RLBA-2021:1807 gcc-toolset-10-dyninst bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-dyninst-10.2.1-2.el8.aarch64.rpm 6115ef68bfa5b0a399ca9cb86fdfe86f0c8a5aae5e887e26de70d859fd7720de gcc-toolset-10-dyninst-devel-10.2.1-2.el8.aarch64.rpm ce7c499238ccf3293ad36463210501cb74b83b6d14e4859034102596a83c9e1c RLSA-2021:1809 Moderate: httpd:2.4 security, bug fix, and enhancement update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199) * httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984) * httpd: mod_http2 concurrent pool usage (CVE-2020-11993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_session_cookie does not respect expiry time (CVE-2018-17199) * httpd: mod_proxy_uwsgi buffer overflow (CVE-2020-11984) * httpd: mod_http2 concurrent pool usage (CVE-2020-11993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLEA-2021:1810 micropipenv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for micropipenv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms micropipenv-1.0.2-1.el8.noarch.rpm 19d23dbe8b285e8459e8800558fc7de59bb5a0eb39d8bfceabe5f47144a30bf7 RLSA-2021:1811 Moderate: libvncserver security update LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvncserver. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libvncserver-0.9.11-17.el8.aarch64.rpm 5e463d1dfcf949348cc4eae4ca3c0d1276b4250c1319e9655a68ed044d979ba7 RLEA-2021:1813 new module: subversion:1.14 Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. This enhancement update adds the subversion:1.14 module to Rocky Linux 8. (BZ#1844947) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 RLEA-2021:1816 perl-IO-String bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-IO-String. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms perl-IO-String-1.08-32.el8.noarch.rpm eb31671c09bc2bfbbca872cfa92a2b1caa57f1b96303b803d68fcb056e75f241 RLBA-2021:1821 spice-gtk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-gtk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spice-glib-0.38-6.el8.aarch64.rpm 1a74e6c9028cc447d918fb2f5a42554b030b5f1c7e984992708821944a4670ed spice-glib-devel-0.38-6.el8.aarch64.rpm 86cd7761502597d05468f05b4faa38ee0ece91932305de99f55589c9b3e17200 spice-gtk-0.38-6.el8.aarch64.rpm e9e1b0daf09d7140c3a9db96922760b6ecf0652044b526d34602795d25fb1526 spice-gtk3-0.38-6.el8.aarch64.rpm 841e2f38d48312b9e85421ab4454f1b18873c7b141d159cd81301fc058d2956c spice-gtk3-devel-0.38-6.el8.aarch64.rpm c1f40907abe97369d37c932cc9cff99628b1ac02941406ad96f796dc331c0d37 spice-gtk3-vala-0.38-6.el8.aarch64.rpm 309081b2d3d131113a459ac9eee885f8d7bb9599e339da1dae64aea4c17857b1 spice-gtk-tools-0.38-6.el8.aarch64.rpm 597776d1905ec7c9d8ae4d3689ad5cbd4c65c7452d651d68292b6b5773677e65 RLBA-2021:1822 perl-Time-HiRes bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Time-HiRes. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms perl-Time-HiRes-1.9758-2.el8.aarch64.rpm dc75d66d975b82698210fe0a53b93ee5cc749b82707149c753eea19a98db99c8 RLEA-2021:1831 gcc-toolset-10-strace bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-strace-5.7-2.el8.aarch64.rpm d8be0176fdbd936af98e690683b23179540de84c9c8c4000329a32fdf00e1d0a RLEA-2021:1833 mod_security bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_security. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mod_security-2.9.2-9.el8.aarch64.rpm 0c595c285233fdc2336c29f9573f16a7de37fff99d54fc75f6b5b9dd2e7ed232 mod_security-mlogc-2.9.2-9.el8.aarch64.rpm 2337b0ff4a1152c80ef244df38fcfd0701642af4b7fd5afd7649b61b42685f17 RLEA-2021:1834 nginx:1.18 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__nginx nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 69db35d92fa82bccbd2023a316e6a9c9b7bdb68f1d9eddb7637f71979d022619 nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 62c9304c6402e163c347c982f7c436e820c2bdf154e1ccff1909468c8af5af4e nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 805947cc2c134e3b666b29c4c9a4caaf9292e0aec3954a48c029ef227ea6b575 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm a9f06a709a8281dad79ff9ba795253ad53147cc0ab3836cc51b949e839725ba9 nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm d08f2d0440651ce84d6f4a4ce5d5a778bd91e7e8d2986f7cb175febaf082b703 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 10d2571b634b6ab83a98dae04691b3099dacae2e3bf13e80822b2c9d1e596931 RLBA-2021:1838 libcanberra bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcanberra. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libcanberra-0.30-18.el8.aarch64.rpm 4a2f858d9cf5d5f03d9ff2fee430839ef63ea74e692b0d732a816ad673e09667 libcanberra-devel-0.30-18.el8.aarch64.rpm 9068a81b666c3ef1cb27562fccdd866512748c4eb94d869f3299bd8a3f2eb775 libcanberra-gtk2-0.30-18.el8.aarch64.rpm 0c1ee4c2006a336abb24f01141e9c3eb261ba162b14c2320db3b92e42c9fef1c libcanberra-gtk3-0.30-18.el8.aarch64.rpm d30eace77af3aa3aec6b0ef802ce7e57e8cc772ccdbec68acb6bb3e4ec82d46d RLBA-2021:1839 gcc-toolset-10-systemtap bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-systemtap-4.4-5.el8.aarch64.rpm 2e4ca5862e8858fc65b2cfc099ecdd838e8061703678e6e4d39234d15d3a4e12 gcc-toolset-10-systemtap-client-4.4-5.el8.aarch64.rpm e89f7607e87eb549ff6bfb79fcdf19a78ca0f3d16c3a630692705a8a852b24cc gcc-toolset-10-systemtap-devel-4.4-5.el8.aarch64.rpm f63a9f983bb91829fac410d545a0cca2d7b77f8061421a5bfa82c8702f5a8471 gcc-toolset-10-systemtap-initscript-4.4-5.el8.aarch64.rpm eb93f52afbbbe7e8204c6ea9ef9528bf97a7114b3d2bf0f4339442639a72156e gcc-toolset-10-systemtap-runtime-4.4-5.el8.aarch64.rpm 8ec124b8f53fa4795c63956424f7d127181e725c5ec30db95e40606d99037c4e gcc-toolset-10-systemtap-sdt-devel-4.4-5.el8.aarch64.rpm be63683cc5e75c9aebca4057b49b732f4c7c26ddf0f8ec7d9d388c453df1c594 gcc-toolset-10-systemtap-server-4.4-5.el8.aarch64.rpm b56a66474b6a1ac70da1fc057d5ea78edd6a58293f1dc28db17e31c652d01efe RLBA-2021:1845 sblim-sfcb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-sfcb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sblim-sfcb-1.4.9-17.el8.aarch64.rpm 2d5a7858d01a371a451ae883b9f1598cebc520530962892fbc24df4d7e173b02 RLSA-2021:1846 Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLBA-2021:1848 dconf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dconf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dconf-0.28.0-4.el8.aarch64.rpm 4101ec6589e4fb68f450e6f79ccdc2512535bb3b33dd78916ddf987b3e313106 RLEA-2021:1850 jbig2dec bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jbig2dec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms jbig2dec-libs-0.16-1.el8.aarch64.rpm f823a156d2e339b08ec94c73d151e081b4904d18fa484c349110bcd566015c93 RLBA-2021:1858 sendmail bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sendmail. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sendmail-8.15.2-34.el8.aarch64.rpm 7d89a998076cc5842b967ed0772d5eaeb1566927c348d16d5514f51dbfe23035 sendmail-cf-8.15.2-34.el8.noarch.rpm a36f63c459f7aac2720ead056105802702f9e10a2f6a49721fd404d7dabc53bc sendmail-doc-8.15.2-34.el8.noarch.rpm 758ce1efd92433ff8b87228a7af6a2f0e0d4575508f86ef0c6500a338dc5714a sendmail-milter-8.15.2-34.el8.aarch64.rpm 3f1c1ccd51b13fba3ae646b38191431b78288467ea3516f8402bfa27c86a2e16 RLEA-2021:1861 pyodbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyodbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pyodbc-4.0.30-2.el8.aarch64.rpm 5e2af6928f33a8716423904312c60085c21bf4b01b378d58a5f2be8664d74713 RLBA-2021:1863 icedtea-web bug fix and enhancement update migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for icedtea-web. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list migrate icedtea-web to use alt-java special binary in our JDK8 packages instead of plain java rocky-linux-8-aarch64-appstream-rpms icedtea-web-1.8.4-4.el8.aarch64.rpm d2d5dca3be480be24f14df9bddd5691a4f10ddda23c618e517f1cffc34c2c534 icedtea-web-javadoc-1.8.4-4.el8.noarch.rpm 6169d567421f91ec5a71fbf28bbbca94ad61dda8421dbe60bdd1a3920fd5aa10 RLBA-2021:1867 targetcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for targetcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms targetcli-2.1.53-2.el8.noarch.rpm 5a7a8a86a342614db2b0e1b7a9e0f5fad7d96bc88b5698cc8f35972040ad4b48 RLEA-2021:1869 new module: postgresql:13 PostgreSQL is an advanced object-relational database management system (DBMS). This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). This enhancement update adds the postgresql:13 module to Rocky Linux 8. (BZ#1855776) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.aarch64.rpm f7bcd5a0f6740a069d1c012096b3edf2721720788607baf4ac42ac5e6d53995d postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLBA-2021:1871 perl:5.30 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl perl-5.30.1-452.module+el8.6.0+878+f93dfff7.aarch64.rpm 3ea49b646e855213708dfef922fbde311fd7a1a84c32818fd62fd0e7b93c9ac1 perl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm a3fee9f9f753cae7118a5c8eaa218b6ae02b2cf1b01bd504639f6ce3c8ef5b93 perl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm 4ae5d31a58e084256d22b67d1c4a35c947fb7829b40bea49b2ca54e21bda4908 perl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm 3b4eaea2d1eaf8d161f48a771f08fac793d30846ad09b36883cce5952ff3ad2a perl-Attribute-Handlers-1.01-452.module+el8.6.0+878+f93dfff7.noarch.rpm 8ee59b6f6685970541cb905ef75a3682c077b86ccac773cd7e09161d67cdc0ad perl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpm b5b1b87db685204860ad90cc43b8ee94f9cd71824431bd6a81b8363c5e751e33 perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm ba92a2cb502c3000180f08e99fd70b5fe1d867c629fe7f88ae62e884a805992d perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpm 9f0471053a901dc7d005594d190e10e8c8b2fab6e1e43e8d7962c9abb86b1890 perl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.aarch64.rpm 9b6e0826474dc14c0afd9dc4275d66757c1e22c0a66e1442930c2b21536b7fb7 perl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 76298425c5c0c047d0cfa2c157e3bb885837e4af76dc8dd8ad17ca4cb8d2bab1 perl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 2ec26f5a7b38817bcccbe848c3cc7d18d4335dec1c4a5bf244f5251d51bfb9b7 perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpm 8dac2514b5b2da9f4b0cb4d6e0e5a381eb88a40c888f56643175a0d4e68074d0 perl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 6232126cab7cd349cef6caa0edd575ff44a7e982344302d46947ae391b5b4500 perl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm a3447e3b3260b007272f8c84ef84acb17cb71d37b7880d1ef6357951ac562315 perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm 22d02ca7ff555e07f90529970338520c44bbe88419eb7c13160583d0983cbc05 perl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 99f2b3a7248c31f7c4cbe24192d97b713e43a76a7caf44e715a4d84b53933d94 perl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm 37daa4a6f0f1667caa2c5c557279368295a761b8598254b058104dc0c2ee1215 perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpm d0454dcef0f769686d8549eba6f84f2767119eb6906a374eeaab6ce394c92e67 perl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.aarch64.rpm afdb8a6a46014b6875ae047cb29ad08d994aa0e68d0c349ade129346904f5b0d perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpm 401c2f47ccb4c201f76cacd3ed4c688798082797fadd2556e839b796cd736d4b perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpm 73ba6e41ae0df4855079b75bbf5b2131a5b0fb3f99f0ea9b91ad8812b5df0b02 perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.aarch64.rpm 872985529d606ce7520400ee24e6d0640224fb208d30d9a7de3e7e516f720923 perl-devel-5.30.1-452.module+el8.6.0+878+f93dfff7.aarch64.rpm f0f16f890f9d51b33894b968dd0ec904884edfe5534c0ca3ae38396ccdafde3d perl-Devel-Peek-1.28-452.module+el8.6.0+878+f93dfff7.aarch64.rpm a2c0c0a7d7eb4c709e29af91d28a085e69d064594c3ef5019cf6860446bd2b23 perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 9cbb5ddbe0f9616f99592c07a804706c73ae714f0a1042e25ad47e3b2437e392 perl-Devel-SelfStubber-1.06-452.module+el8.6.0+878+f93dfff7.noarch.rpm 2d5e00575dfa0fbcdaf020a04456459c776b478497f6f122cc4861713aec2e85 perl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.aarch64.rpm 41b678e29dfe0a2f79a0148857d3e76c4bef58b7960fcede4f5ffb95448d9f37 perl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 497e2b909674fed7b47c3dfa281121621efded7d05d019363aff9bfad4c1a527 perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.aarch64.rpm f2a4d752e8722c823852270abcb64e9197c085cb1667885d3116b6feb0e8422e perl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.aarch64.rpm b428259f726200b5e030e3931252b58379e0d8a7225d5d3a5cad3f7f7864fc4c perl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 140e1e284cfcd47e53a4e41a951f7bbd2537c9c88fbb6b722957e3593dce6932 perl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 0a781191198dee85d26d84cd7af778e1a36698ca1700754e3122420a68594f1f perl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 7febbfbd109ef0718f64b2df303fec4f2eda17a4f14febc7d5ad55ed478599c9 perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpm 843d3bae7c78a18366684340d1b11b2176b3f89168a5305602d5f73851071297 perl-Errno-1.30-452.module+el8.6.0+878+f93dfff7.aarch64.rpm e7ce38acec318f839062a311a39ead203210d37ad019fac1f989c5f77ac9cda3 perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm 4e8daf0287ea71e64fdb9e6391f257d9ea6c23547d5894df74a595b3ff610199 perl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm 65b9ba1b7e84507cc648a422475283e27ed53de4097f1ff2121b9f9ff3d97c7e perl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm 043ff366aad10957c32292d322c3458202d739c703261b8cbfd14f58bb5da151 perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm f636b21815be2e444fa5b42e99e4328c024327af776bffaebd9d33825d346be7 perl-ExtUtils-Embed-1.35-452.module+el8.6.0+878+f93dfff7.noarch.rpm e3b71b76d50572759d35712baafd58373b9a07b5610284575d7678294d03c655 perl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm 857b4014bddf434d5e21745f92b52a4f046f666cbbdeade6c4043a1b8796e40c perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm 398bd10b093a537a73d3d0df58d4581b21c67d612279a37b22fd614d23adea17 perl-ExtUtils-Manifest-1.72-438.module+el8.6.0+878+f93dfff7.noarch.rpm 4d1776ec7edef8aa7ef06b53a9ccfe28eb78d28dbac1fcdc0f9826591cff9ba6 perl-ExtUtils-Miniperl-1.09-452.module+el8.6.0+878+f93dfff7.noarch.rpm 5b1840a6605732ecda572a10e704e82201b12a674f49f4e3a78cd9c25c4f5534 perl-ExtUtils-MM-Utils-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm cca7d27dbc8d3bb0f080aecd8c1f15e5164a9d9087bac91fffb21753ea601f17 perl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm d8b1feea37aabbfefe537f9b4b886a095d450334b9fb457ceb469a75d53dcd6c perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13ded30ed62603085b6b071fd8b51cd58f57073697222a8cf30bb67e9d029180 perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpm fc532cf1d81ed8b642813f397665294f4b8e78cbfa9aaff012563de356187cc4 perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpm 995e08ed28513f82e5821425a4d4fc6edc45ee0a783a1f26eacb6359b3f42e11 perl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm f404d9e30a5f8768ff3926e32b45b0b8334f72e3e92b0e4b25c64e05f727708c perl-File-Temp-0.230.900-439.module+el8.6.0+878+f93dfff7.noarch.rpm 67bff95e50d168699ea7a9ea2ec030daabd312f2aaa5d945ac34f92266216242 perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpm 5094b53d07808bfd255aa5b9a1315ad01f5d1892624a3381074d552d82ed562d perl-Filter-1.59-440.module+el8.6.0+878+f93dfff7.aarch64.rpm 3908a29229cd2b6b4c05b7d2321d0f8b801ed4cc3a28bf767215bb8037fd6b5f perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm 1ff0c6c297133b9629712d61b0751dab739548a09a9ed1a014f89b19e210942c perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm 37fcc7a1a0384d0d2fed35aa935e2249dc65641c6ed36cfbaffb844dce6ea14a perl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpm 78bd8b6bb85141daa4c8a4ed9f292276d00dc3d79511de14a028deda013b6f89 perl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 22f6dae1203f60f7112d8a3bf69f730cca7e92ff26307fa0479297b263a5a853 perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpm 0ee7a2f08d700939b9878147d4a711c27fff146c037bdddd7f4375dfbe632c5d perl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpm 46aa912995002371271894c952f50b8f1fb45fd4afe94a1a0a12708173c5d73d perl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm 13342650fe53e4f929d0c79e5a78bfccd68333cba9d6adc36c0899b7ff4c16be perl-interpreter-5.30.1-452.module+el8.6.0+878+f93dfff7.aarch64.rpm c935841874409bc76968b9f897001b42234851124f7c20233935dda1f0be084f perl-IO-1.40-452.module+el8.6.0+878+f93dfff7.aarch64.rpm 5a1817f0224bb22f4651e88b4d607433d4780d0f015a5f1b72730812caea3e23 perl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpm e1b32c483db01fa644aa11da6316c65ae15c52cdc683702f2724e1bd74c36fc6 perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm 1a865597d7d0da824043c62c50cdd0d3fa02e1f9e1e3420b743a4cffa03d0b4d perl-IO-Zlib-1.10-452.module+el8.6.0+878+f93dfff7.noarch.rpm 274ec5cde7f09867747e7b5a0fe03632ea11a46c12d6795bf72d3347a6737312 perl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm 24140d4b859d7da7b5422b39bb33058cb4ed037ec81a33cb29331d61b8391d36 perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpm 0785aa352684de2b27e973a2414cabfd1f60ff94cb9b1c8f1595b8a773d74ecd perl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.aarch64.rpm 3ff991466a1c9f2f64f1164c1d4c4fe5e5f7f2966c49d3ba393f00de8ac55496 perl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm fcf81923aca881d995501ac6adb0b600d85acbe1e146c92024e96bd92c8adfa1 perl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm b721a1d996c4455e7c4973dbe7740cc31e3f6956124c2b3bd9ad8005c98e5f3e perl-libnetcfg-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpm f9ab6fdfa12dec0592ef9a8b503a9c8211420f0e9dfdecb2d0e31175be92bd88 perl-libs-5.30.1-452.module+el8.6.0+878+f93dfff7.aarch64.rpm d903a245886ebcb7c31972b3d9fd65701bde7406cb599408252ff5301512fc39 perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm b642ac31df8f05336d101b3607d855839335742ba4b80652bcd4d19fa8c71b2e perl-Locale-Maketext-Simple-0.21-452.module+el8.6.0+878+f93dfff7.noarch.rpm 5580a081788e52639ea7195fc9dc42a331ddee3c17d8b01dffc8fd4ed8d89078 perl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm 1bc02c4b987dcdcba510201debe3955a9fb8212874e3d7ee8342cc5b248dceb8 perl-macros-5.30.1-452.module+el8.6.0+878+f93dfff7.aarch64.rpm 1996cf9ec34d6c82079a8fa2af1b37e4ab84bb10d15296a2bf8c4a2a7b0c1b3a perl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm d12bc389fea342859c1ce3fa9a6116e31ae66d6225797ed145796ee1d73325d8 perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.aarch64.rpm b2738ffe053d7a125fbe0294af2ce7b9e2c0a9ef972822671a4e1689228f109c perl-Memoize-1.03-452.module+el8.6.0+878+f93dfff7.noarch.rpm fece125172c411eab99d0801c835b1713860fce7cd859cc8e385a52c9d08e88d perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c457e14e3a02effcf60d88591e786e6fc0c3dd8531a0e903779825fd62bff14 perl-Math-Complex-1.59-452.module+el8.6.0+878+f93dfff7.noarch.rpm f3417b4d9357bff6b547c14fe045cbf57152240481737d1e6bb38bb7d13d5dca perl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.aarch64.rpm da2edcc116f5d66f6eb2dc23819a8e0f51e330373560ec0545871b3ff0bf4c96 perl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpm df5dd4eb3e9897dba7b9d45123b567b21f33f83fe70141c3ed2fa6132d619c82 perl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm 20d8397c0ab7ad88baf463277dd8fc673e094ea05a4adda02fa0f692ff6374c1 perl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpm cc8295684213d6c1f1b9bd7f25a88b9621fce85560e9a719a32121cb3b762361 perl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpm ad836cedbb118144fbb29c1adacf8745b0be196bed0e7c20a7918df0c7632327 perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm 1d281d8bb79c2f3a7f8e8245faeac9d5381e450515d7e510b4bbf8f9313205e0 perl-Module-Loaded-0.08-452.module+el8.6.0+878+f93dfff7.noarch.rpm a98e64eacbd340f91a116ffc76ee54bf9a1172724e499dfb940f115da0a57d11 perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm 23471694783ed058ce2795ffffb3754ac5f991a18d78b9e6760850e3faef4b79 perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm 3774d58fd4f01ac6879086efa733a2cffe96a0a3dbbe0bd2eaacb1dcfa830691 perl-Net-Ping-2.71-452.module+el8.6.0+878+f93dfff7.noarch.rpm e864c75d268bd9c134560ba2a1c2b035df4b9026c7c5880b25f09a06a764a242 perl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 2107d6fe2bd4c30f879d05e9e91f3a67b669e9311a7d821bc1eaedc69362ac0e perl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm 4e7d56c452587e7eda8a6d95f035df77838d724beb89d8300f489bf05c4119c6 perl-open-1.11-452.module+el8.6.0+878+f93dfff7.noarch.rpm aba23b29cc51a254171cbe50bfa2b77c9aa795ed73d507c532d00d37f0770097 perl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpm 4dde96c5ee5e90cef994a5a5ee77dae66a92f6aa921f46a228c07e95e7b3a737 perl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpm 04a4aa24cc6629824fe41b56d2c681fa8bdcc4c653b23cbc779ec3b9a9d3cfdf perl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.aarch64.rpm 2a28f679f001909cc3710b117c3b8b8329824ebdcca201e1bc46bf35d2ed79fe perl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpm 030735bc0b0a45c4329c3cff957df2bc31efcaf85e8a83ac14caaf7590278bbe perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.aarch64.rpm f1c7d8bfb0ca6183c86877ddd7b371e7a67a127e34ba374d0700df2571783514 perl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpm 68d69421e6ecdd0c17b838ce5cd87e6178e480b859e741d75790a38e001a0e3a perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpm 9233f630e519b178b9d2554a6567fa54427edb910b2305affe3fd505c3eebdaf perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpm 608c1ecdbfef0891e38d0b5feaa8add6834ee055eaf4eefb2a46fce6703a7437 perl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpm e9edbfc3c8c01620a652dd1dabfdaf9aaa6f8b245ffdc98aaa49d59185f5016a perl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm e3f06d1d21d110ce66bab915eb18d5e3e2113a3778816243a86552fb0f56adb8 perl-Pod-Html-1.24-452.module+el8.6.0+878+f93dfff7.noarch.rpm fff84361d5bf54b52cb450af2c8c89420b80a02c1c4595ac2169907e320563df perl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpm f97ad11912e5d33ff4ecd9080ca24d427fbf5d44165f53d663e0affa77f2b01c perl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpm 2bd78df4238f2f43648eaaff0f8a4793f683574d35f41936e9d612ebe16c80d5 perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpm 35d8c093f5f2aacfab1e753a4c0c2bcf2736885654ccd881b194eccb8a3490d9 perl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpm 684f8c4f2fad53955dc42f7e46620c817d77f6ada02b3585ed01890bc86ac7e0 perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpm 8e0adc72bb11846ec003cf0b3d8a7fda73b819b12cb4cd1f83cb74372e7e1917 perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 5da3d1b9750d3e8de649609447be131a84af4b4c68a07394b0c670b6f87f1453 perl-SelfLoader-1.25-452.module+el8.6.0+878+f93dfff7.noarch.rpm 6554f62819084c0bf385d680182d9b56880743886ebeab6d361157f29a6f3157 perl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.aarch64.rpm bbab83bb54090b30e865aea443471fb914293bc5615c81faf05d1dd2209a1057 perl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.aarch64.rpm e605279c6c89893268d830ebf4d7349e3ed3226101a80960ae52108487e977d2 perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm f303faa506dc1d7735a1fba64383acc4c4075c37a502e5f3a6793849dd3f50c4 perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpm 75489ca0ff106abbfe0c4bcae3fed2348adfeba22114e664f4d4f000f43d3f08 perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpm e4a62fd1b70f1d578e96a4a4da7b0e1a26bcec6ce4321d111d00fdbc88388bb7 perl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.aarch64.rpm 8c376cd4f3a4a128ba9059b381585fd81b1e52a4d493dedb8aff24ebc643ac0d perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpm 94c51f36928bb91516b6f64205a2589ac0da63b50f1b2fe2b39b8dd3e89cdb57 perl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm 245c524882b954a1bc9338329ae3e13a689bd7e205ff50f7b294505306748253 perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm 77b7f51b21e2373d909905b0d45191814fbb1c8dd9c855a250048f9437944533 perl-Test-1.31-452.module+el8.6.0+878+f93dfff7.noarch.rpm f381236a3739fde90a197fa1177fc4a2589b2d1b6d78ac6d1a0b88d78357b7a8 perl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm 3c65b86f40ffdda0147a2d48d42fff7b56d6f62a732750447b6c5569035abffc perl-tests-5.30.1-452.module+el8.6.0+878+f93dfff7.aarch64.rpm 2b4425d418f756501bb9d9c33bae7d5297628f87373acc622bc426cd0ada092b perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpm fa90202ab3e84856ac931df1ec5dfe31e4854dae428d3dc1a888e17baeccb30b perl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpm a66f0ac7400eb036108d48bac612d9b6e2f35cb1c252f7f0cb16e7a5f1e062ce perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpm a6145f9481f9059c301eb1355d0cdd688feebab8d19fc2b2ebcd591737903628 perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpm 21526ffc5114cdc02685c9cf9c58439ac69fc4c86f1bd1a08f25ddc95755cb1d perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpm bbb2f7ee2d5ad5802a77e9bf9defdb38173024dc6a45cec74d1d5b2b6c5fedd5 perl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpm f0c2f470ce4e6525bd9b295a5bdfe86089b43f7563b5f35f913c4727d5b30df8 perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm 0ad56d5e6405906910a2efe8448960cdb0b14fe3557e69cf8b59651e75a6abca perl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm e3e8703e0c6628e7814fe4c7533d995643a929b4fbb931708d6e22729b694f6e perl-threads-2.22-439.module+el8.6.0+878+f93dfff7.aarch64.rpm 0120b2363c0ab5ff1de28ac18730189834c2ab24da15634a496a808c67f9e8f2 perl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.aarch64.rpm 04f631e33dde3aa3225758169fb10f2df5052575b0cf521c6d39e7c6e130986e perl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.aarch64.rpm b33d000b05945eb6a68c9c1eded2089eb0542bca9604d7d8f71d796e6e810393 perl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm d7d4e67d3dad8f5cf8721b9842d490a23b2d2db38e107fdb785b5b84045aa8a4 perl-Time-Piece-1.33-452.module+el8.6.0+878+f93dfff7.aarch64.rpm 254231d54d04d270d8804a182d41196ed08a56470ffaa6aec54c652df910617a perl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.aarch64.rpm a855fe39c39b4c5b56f428835db080bae31a450f9a48f9ff7032ca16a15a6942 perl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.aarch64.rpm df9c42e186df9424f991acebaa9a644aba1c559f190147d9806eaece5e56c918 perl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm 6852a1483a15b008cb44a2881bae6beec4dd4e1e00d6743caf3d1e822e38bfa0 perl-utils-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpm 2a0972dc24a20292397915a852656304ffd8ec958239b0c9f1f226658179a158 perl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.aarch64.rpm ebfdfab5ef3882130cb3cfacd301a5ba4f4fd3c19b9f92166dcb4969f071001b RLBA-2021:1878 squid:4 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLSA-2021:1879 Moderate: python38:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-urllib3, PyYAML, python-jinja2, python-requests, mod_wsgi, python38, python-asn1crypto, python3x-pip, python-chardet, python-markupsafe, Cython, python-psutil, python-ply, babel, python-wheel, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-lxml: mXSS due to the use of improper parser (CVE-2020-27783) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.aarch64.rpm 7b2d3894385ece11897a9697d9f90ed6ce17cda40980d295919369fe140c8b13 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 19b4eb8c7fc998d915be1de87f41b5aa455bb618b6ef606aac2743a29a108132 python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm bab1991b44f95916cdd7be3a832a779b2479e6a5528706d955f97a3f20cd1761 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 24f2309bb7ba0415cd0e694ee705f32d28a4023a0bc407089cb1cc088cce869c python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.aarch64.rpm ebe4eccdf7f60bcd962279c10f4b674752dbdb7e3323b7539aa35eb7df6e6203 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e RLBA-2021:1880 mod_fcgid bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_fcgid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mod_fcgid-2.3.9-17.el8.aarch64.rpm 0c46aac3f55f2bef08b907ef1b9d048f29912417b6ce13a33103d2fff3936a38 RLBA-2021:1882 inkscape:0.92.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour, inkscape. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__inkscape python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2021:1892 source-highlight bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for source-highlight. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms source-highlight-3.1.8-17.el8.aarch64.rpm ffad06c2cb9ac891826d24c2c8d5a7ea2325d9ed2c1f3eafbfe43c65b5d775df RLEA-2021:1893 new module: mariadb:10.5 MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This enhancement update adds the mariadb:10.5 module to Rocky Linux 8. (BZ#1855781) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a RLBA-2021:1894 abattis-cantarell-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abattis-cantarell-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms abattis-cantarell-fonts-0.0.25-6.el8.noarch.rpm 467a74c9b44fd7ca2910712a83ed040fcbcaafbc7fda8b541bd1d6d8cfc6988d RLBA-2021:1895 libgovirt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgovirt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libgovirt-0.3.7-4.el8.aarch64.rpm e4a2ec6bcdfae5838c59cc98db04bfa9e1b45fa2c75eebcb409131f327e59365 RLBA-2021:1897 maven:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLBA-2021:1899 gcc-toolset-10-gdb bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.4 Release Notes. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-gdb-9.2-4.el8.aarch64.rpm 250c3fb10348230b91469bb430507e172e5f5f92706fc9ea1edefe4f92223a47 gcc-toolset-10-gdb-doc-9.2-4.el8.noarch.rpm 86571499188f38badc2490256a2476342b11c70891d3a9d27ce75c640781c5bd gcc-toolset-10-gdb-gdbserver-9.2-4.el8.aarch64.rpm 1d78bec7f1006ff2f8f92ccbcff81e7d05c33d9bac3f6e7a43c2c1272e3c80e4 RLBA-2021:1902 uuid bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for uuid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms uuid-1.6.2-43.el8.aarch64.rpm 9888d47388b39e570cc05f5392a941258e5357cad3edfd5f17a1593df72b6750 RLBA-2021:1903 pulseaudio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pulseaudio, twolame. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms twolame-libs-0.3.13-12.el8.aarch64.rpm 8213b5a50bdc7481eef3d542f2831791f6ab92439c10648d2e94b60b1f0ca747 RLEA-2021:1906 libyang bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libyang. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libyang-1.0.184-1.el8.aarch64.rpm 97a9801b2d8086662e6da1198e24624cc4b04d9901e3c368d4f09197ccccc0a3 RLBA-2021:1911 container-tools:2.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2021:1912 ilmbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ilmbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ilmbase-2.2.0-13.el8.aarch64.rpm 90956a5fffb509420e81afe5c7d70b4bf52ea576ffddd832e33485e0c964656a RLBA-2021:1913 SDL and gstreamer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for SDL, gstreamer1-plugins-base, gstreamer1-plugins-good. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gstreamer1-plugins-base-1.16.1-2.el8.aarch64.rpm fc6ec5d69083fac6ffe25b7a53e136766790f43a7c1e6c246e1d4f4baff415bb gstreamer1-plugins-base-devel-1.16.1-2.el8.aarch64.rpm 20430a09ec2fcf7a7b82f6150ff07227868601cc72fb1dbb057b7fc231d69f93 SDL-1.2.15-39.el8.aarch64.rpm 95adcc04a73985ae8718659e199fddc13589060fe3df6aaffbbefdae836402c7 SDL-devel-1.2.15-39.el8.aarch64.rpm 0923032a66d9234e47c60c4e8b6adc1fc1242fc8265a4d95da910c95ad2f844e RLBA-2021:1914 libsmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libsmi-0.4.8-23.el8.aarch64.rpm 640bd2673211ea97751cae147f177de9dca328db29f1bd732372ff6eb5cf642f RLBA-2021:1915 gpm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gpm-1.20.7-17.el8.aarch64.rpm 0574ca784584382e94580c02919faa6061fed29b57f5441bf979a91b6d097b98 gpm-devel-1.20.7-17.el8.aarch64.rpm 7d1379574f84a49f48074b9d23c6f233dc40bd36813af8c4ed4474e49c80c4dc gpm-libs-1.20.7-17.el8.aarch64.rpm b17a53cf6eb9d512f44506f10096ffac1d9cf891acfc84205fdcdde878b67fb3 RLBA-2021:1916 automake bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for automake. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms automake-1.16.1-7.el8.noarch.rpm cdb509c8eeff8702dd46562eea024cdbe930a70b8cb8592cda1305a0cb8c5e87 RLBA-2021:1917 tang bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tang. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tang-7-6.el8.aarch64.rpm 509211bf22d9ae1a05bb58b7eebbb856ebd14ab678f40fe0b51c0608b959f9b7 RLEA-2021:1919 new module: python39:3.9 Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.aarch64.rpm 945155b2014169d41094e7435f5f87d32f1051e106387ca6cc8e793f5f4724cc python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.aarch64.rpm a1d3823b13a2340272701cc377c599dc99c444cfbc72ddaa59e8bb49a0be753a python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.aarch64.rpm ba724bda5f89379dc12d94c50dd02ef0cc45d4a2657a311469101a57adbc9866 python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm dc96fad532dd6778a43cab79eca2e80d99d5c3daffd69ea743282f8f1a956422 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 518551ecb5bf3e32fbcf7dcc25feba54c738e86f77d84c1e50ff74e7f5f0f0b6 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 9dc218c0e4d7aa1754732b02593a0f0f727902dba3a3f0d93f95538c5c511ece python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.aarch64.rpm c107d9e7b25869b140877301ac6abefa2d4b9bac14a623975ca7aad2eaf7697f python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.aarch64.rpm b5b8a4573507189006d61b606f716c102e75ad51f13c9a830467cb6bd3f56151 python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 RLBA-2021:1920 go-srpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for go-srpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms go-srpm-macros-2-17.el8.noarch.rpm 18ed6d3a24dac62dea1c6facc0045ddc89c05f450128561a9b063579727b1ced RLBA-2021:1921 docbook-style-xsl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for docbook-style-xsl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms docbook-style-xsl-1.79.2-9.el8.noarch.rpm c75d7bbcdb5fe5b6ca066fa140672e69eab050a305884ee5380618d1ba0ceabe RLSA-2021:1924 Low: spice security update The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for spice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spice-server-0.14.3-4.el8.aarch64.rpm 76cd13554e4f96f16e3d122c21b986fd88dbba4e83e431f21b1ec35a821530db RLBA-2021:1930 python36:3.6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python36 python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.aarch64.rpm 3de89fe5d36287bb8d6c74157cba1b4cf6fbe17f4c1e03ac1d1040e5b0e3d14b python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.aarch64.rpm 607a20914f9ed6d85d6fb22a76d69a3bab83c47379aeb08b1bd26873073c84dc python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.aarch64.rpm 86d26ac3061c8c07993f1ea65a2056d31637013842915f38f9105ffb4469fcae python3-PyMySQL-0.10.1-2.module+el8.4.0+597+ddf0ddea.noarch.rpm f8fc550646c9ac5e7f2c076a7a7a341ce148be616d7e2415ed7ab35157835e00 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.aarch64.rpm 1fe2e5c3d5840ddb5141a1845ddffe8c88ee30f64ef4906b5853ad9b643794c9 python-pymongo-doc-3.7.0-1.module+el8.5.0+671+195e4563.noarch.rpm 2e11f6f4f770a9b60d561dc8f80e554fac2919dfc041a3f18639fef6f328838e rocky-linux-8-aarch64-appstream-rpms__python27 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLBA-2021:1933 mod_auth_openidc:2.3 bug fix update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 167194b776db1036319dda56b06909ff2660411660b1904aa3744804890143c5 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 147c2a485b610d217ea9d1b92fce09583e1eeeebf7c1ac0d792ec5e61cf8c508 RLBA-2021:1936 scap-workbench bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scap-workbench. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms scap-workbench-1.2.0-8.el8.aarch64.rpm e083ef88c84a71c4ff6f5dbd88ed4b04dcdd89a086d67630cc2b7f44dd44239b RLBA-2021:1937 protobuf-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for protobuf-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms protobuf-c-1.3.0-6.el8.aarch64.rpm da6e23a6c75245ab685ca20bc94c49f3bb5d5399c7d4ef0435155880ac611dee protobuf-c-compiler-1.3.0-6.el8.aarch64.rpm c4302235686f14e2664a06d3d8d78babfe36a275c764d6e026a11efb3b1e64d7 protobuf-c-devel-1.3.0-6.el8.aarch64.rpm fbf19a733f70e6f44d8687ae5153e291a3eb0915e1eb0f1d1c10206378f4b6dd RLBA-2021:1939 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libosinfo, osinfo-db, osinfo-db-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms osinfo-db-tools-1.9.0-1.el8.aarch64.rpm b24b81ffb4be9601e8bb4d745a83bdba26750fc6f321ce3693cd6c6c029f3aaa RLBA-2021:1942 ibus-typing-booster bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-typing-booster. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms emoji-picker-2.1.0-5.el8.noarch.rpm b0ea7833388d43f69702d5e0c2b71af58aa8821874411aeb3090a466a7fcc7a9 ibus-typing-booster-2.1.0-5.el8.noarch.rpm 7d2418858ad069c2dafc8b05c15f57b82b0909048c508cec05fb439af48b1209 RLBA-2021:1943 crash-trace-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-trace-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms crash-trace-command-2.0-18.el8.aarch64.rpm a5b648b2c89d40be732e140ac36027553aa05df095f4201de896557bdc68dc9b RLEA-2021:1946 tracer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tracer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-tracer-0.7.5-2.el8.noarch.rpm 2ff784b8c47308fe359a02880d75967a9b02893cffa151521f65dd15ca7d2df5 tracer-common-0.7.5-2.el8.noarch.rpm 524bbd9c63719d338077423b5af14aec807df7065848f01371e45c79b4e45e63 RLBA-2021:1948 ibus-table bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-table. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ibus-table-1.9.18-6.el8.noarch.rpm c6b5e4c48e6f2147bc59122720ba4b62a1f3b0ca48a1bacf7917ed348f53a846 RLBA-2021:1951 new module: container-tools:3.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:3.0 module to Rocky Linux 8. (BZ#1929575) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2021:1979 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLSA-2021:1983 Important: idm:DL1 security update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLSA-2021:2259 Important: nginx:1.18 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nginx nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 69db35d92fa82bccbd2023a316e6a9c9b7bdb68f1d9eddb7637f71979d022619 nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 62c9304c6402e163c347c982f7c436e820c2bdf154e1ccff1909468c8af5af4e nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 805947cc2c134e3b666b29c4c9a4caaf9292e0aec3954a48c029ef227ea6b575 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm a9f06a709a8281dad79ff9ba795253ad53147cc0ab3836cc51b949e839725ba9 nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm d08f2d0440651ce84d6f4a4ce5d5a778bd91e7e8d2986f7cb175febaf082b703 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 10d2571b634b6ab83a98dae04691b3099dacae2e3bf13e80822b2c9d1e596931 RLSA-2021:2290 Important: nginx:1.16 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nginx nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm d5b8f60a7ceb869b906e2d5cabf4e86735444a5e1d74ebd79c3621d82dffa294 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm f0f34567660426431b24e1827fa589e67eb2eb5fee8f4a3b1782d2aee2952f92 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 564a5d264140286c451f5014d232d1a87791c69151d3e874e404a442a5435765 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 0519ea5c0c710d63fc77cdf54b038c53b05be69218ae71fb70a7663c2839f000 nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 57354dd995efa189edff9bbe576bac7070c408661ee0c62a3de77b6659874f06 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm b376e2a5ba009361cf77aaa15699b03b068a0fd1feb4cefdaee2f8f15632940b RLSA-2021:2291 Important: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2021:2360 Important: postgresql:9.6 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (9.6.22) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (9.6.22) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql postgresql-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 1485556c6d70194928bc3df77631b6ea975e93a2ad55c450c3627023687169a6 postgresql-contrib-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 4ffc9b84b02e4f8fcebc179a2ce120952cfb93d36b5d7e53d4c488dda7386dd1 postgresql-docs-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 796360476e369bf08ec8a8cd8e43dc2587ba21f1dc208c25d0185a984d387f6f postgresql-plperl-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 5202e034d79af29a1468242f669ed47c3feacbda8f047a7e31e1aed70ece7542 postgresql-plpython3-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 1be33beca579ef9f5dac06dd385a468f0a50f78a7a049ffa43e468599f2b929d postgresql-pltcl-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 688ab03eec1a35c73dcb8486256b481d63dc182e15894f1c987795f9ff762642 postgresql-server-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 49c77daa44748bf2ae2b133806604e6bd53dd04e9f4db3aa6a11e6e71ac01600 postgresql-server-devel-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 5aa5c255059c29c9ceade63f6e184cb1e90c4eea2b2780e912eedceb14aa7256 postgresql-static-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm 516fced5f6a9fa5c469b2c7995ee71c847437ee593ecb893cd8fefe89540d084 postgresql-test-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm d2d130f2c246bbb78162559a5f34c6f6672abd096fece445d5c0d43fe65fedd5 postgresql-test-rpm-macros-9.6.22-1.module+el8.5.0+687+7cd82e08.aarch64.rpm b5a01974eaa5310d85b84f18c7c939b55bc8232c0ef85c9f1745a3974092e00c RLSA-2021:2363 Important: gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gupnp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms gupnp-1.0.6-2.el8_4.aarch64.rpm bc0c3473e05e6b45cd5c31cd6e29f61b94a0df669cd3025d229c85a2646a44b1 RLSA-2021:2370 Important: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2021:2371 Important: container-tools:rhel8 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * runc: vulnerable to symlink exchange attack (CVE-2021-30465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 0880ca163c08d71f4effbda997938a25c3080cc93e7c864d4c76fb2b40956c92 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2021:2372 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.7) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) * postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.7) Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) * postgresql: Partition constraint violation errors leak values of denied columns (CVE-2021-3393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLSA-2021:2375 Important: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.3). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.3). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) * postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE (CVE-2021-32028) * postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING (CVE-2021-32029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.aarch64.rpm f7bcd5a0f6740a069d1c012096b3edf2721720788607baf4ac42ac5e6d53995d postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.aarch64.rpm 7b2d3894385ece11897a9697d9f90ed6ce17cda40980d295919369fe140c8b13 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 19b4eb8c7fc998d915be1de87f41b5aa455bb618b6ef606aac2743a29a108132 python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm bab1991b44f95916cdd7be3a832a779b2479e6a5528706d955f97a3f20cd1761 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 24f2309bb7ba0415cd0e694ee705f32d28a4023a0bc407089cb1cc088cce869c python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.aarch64.rpm ee022e80cc0b6ea0539fd6a02a6e5320596bc8e8d0773b7fc6e9466dcd340cac python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.aarch64.rpm ebe4eccdf7f60bcd962279c10f4b674752dbdb7e3323b7539aa35eb7df6e6203 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e RLSA-2021:2584 Moderate: ruby:2.7 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999) Security Fix(es): * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.3). (BZ#1951999) Security Fix(es): * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1952000) rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.aarch64.rpm 796c11f0cc7e0d6bff9568c0c195c276755a3acf101e7c7bc95d5ffdfba8e112 rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.aarch64.rpm dd693d8e37d6dde4f0d72425e0a1dd38ec56c0cba528097859af7fc42c5ea0ec rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.aarch64.rpm 843fe8913c91ea33e7f5020c1a6e6a79b56ae281825b4be911cb6a456332704a rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLSA-2021:2587 Moderate: ruby:2.5 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626) Security Fix(es): * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.5.9). (BZ#1952626) Security Fix(es): * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.aarch64.rpm d6e83db1ed53961b708866292cbcde971a111734e3b552032fcb204101e1dfdc rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLSA-2021:2588 Moderate: ruby:2.6 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627) Security Fix(es): * rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881) * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.7). (BZ#1952627) Security Fix(es): * rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881) * ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845) * ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication (CVE-2019-16201) * ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255) * rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663) * ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933) * ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613) * ruby: XML round-trip vulnerability in REXML (CVE-2021-28965) * ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Resolv::DNS: ruby:2.6/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [Rocky Linux-8] (BZ#1954968) rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.aarch64.rpm 3a517bbe26ade13a9b023fd013c0f7887633c4dabc04dd328edf37a7a2ded43a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.aarch64.rpm fc764cf9237a3d754448a117e5c736df0ee282b2b04dc86b46672edfc8e14e3c rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 RLBA-2021:2592 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * ipa: ipa-server-upgrade is failing while upgrading 8.3 to 8.4: Only attempt to upgrade ACME configuration files if deployed (BZ#1959984) rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLSA-2021:3020 Important: ruby:2.7 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.aarch64.rpm 796c11f0cc7e0d6bff9568c0c195c276755a3acf101e7c7bc95d5ffdfba8e112 rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.aarch64.rpm dd693d8e37d6dde4f0d72425e0a1dd38ec56c0cba528097859af7fc42c5ea0ec rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.aarch64.rpm 843fe8913c91ea33e7f5020c1a6e6a79b56ae281825b4be911cb6a456332704a rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLSA-2021:3061 Moderate: virt:rhel and virt-devel:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754) * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416) * qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301) * Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE-2020-13754) * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE-2020-27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE-2021-3416) * qemu: out-of-bound heap buffer access via an interrupt ID field (CVE-2021-20221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot restart default network and firewalld: iptables: No chain/target/match by that name. (BZ#1958301) * Rocky Linux8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679) rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2021:3070 container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 RLSA-2021:3073 Moderate: nodejs:12 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.22.3). (BZ#1978201) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (12.22.3). (BZ#1978201) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:3074 Moderate: nodejs:14 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.17.3). (BZ#1978203) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.17.3). (BZ#1978203) Security Fix(es): * nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362) * nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290) * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:3075 Low: libuv security update libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libuv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libuv-1.41.1-1.el8_4.aarch64.rpm 0f26b1bffc2683df00c36aa6d73e5d1b205a5181524d1ed65dc02cc08bc50224 RLBA-2021:3083 gcc-toolset-10-valgrind bug fix and enhancement update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix(es): * incorrect pkgconfig virtual provides in devel packages (BZ#1968378) For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix(es): * incorrect pkgconfig virtual provides in devel packages (BZ#1968378) For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-valgrind-3.16.0-6.el8_4.aarch64.rpm b6df5202f25d365bd9b53a2cddeedd33521c93e65fe0d44de6288cb17e1b7e08 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.aarch64.rpm 36427babf02e41f165a32da3ce173d9268bbbd2e15e8bc67297a443bef635462 RLSA-2021:3590 Moderate: mysql:8.0 security, bug fix, and enhancement update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693) Security Fix(es): * mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424) * mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804) * mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444) * mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042) * mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422) * mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860) * mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402) * mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852) * mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399) * mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870) * mysql: Server: Logging unspecified vulnerability (CVE-2020-14873) * mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385) * mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011) * mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038) * mysql: Server: Options unspecified vulnerability (CVE-2021-2146) * mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232) * mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208) * mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308) * mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307) * mysql: Server: Federated unspecified vulnerability (CVE-2021-2354) * mysql: Server: GIS unspecified vulnerability (CVE-2021-2417) * mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Segfault and possible DoS with a crafted query (BZ#1996699) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.26). (BZ#1996693) Security Fix(es): * mysql: Server: Stored Procedure multiple vulnerabilities (CVE-2020-14672, CVE-2021-2046, CVE-2021-2072, CVE-2021-2081, CVE-2021-2215, CVE-2021-2217, CVE-2021-2293, CVE-2021-2304, CVE-2021-2424) * mysql: Server: FTS multiple vulnerabilities (CVE-2020-14765, CVE-2020-14789, CVE-2020-14804) * mysql: Server: Optimizer multiple vulnerabilities (CVE-2020-14769, CVE-2020-14773, CVE-2020-14777, CVE-2020-14785, CVE-2020-14793, CVE-2020-14794, CVE-2020-14809, CVE-2020-14830, CVE-2020-14836, CVE-2020-14837, CVE-2020-14839, CVE-2020-14845, CVE-2020-14846, CVE-2020-14861, CVE-2020-14866, CVE-2020-14868, CVE-2020-14888, CVE-2020-14891, CVE-2020-14893, CVE-2021-2001, CVE-2021-2021, CVE-2021-2024, CVE-2021-2030, CVE-2021-2031, CVE-2021-2036, CVE-2021-2055, CVE-2021-2060, CVE-2021-2065, CVE-2021-2070, CVE-2021-2076, CVE-2021-2164, CVE-2021-2169, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2213, CVE-2021-2230, CVE-2021-2278, CVE-2021-2298, CVE-2021-2299, CVE-2021-2342, CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2412, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441, CVE-2021-2444) * mysql: InnoDB multiple vulnerabilities (CVE-2020-14775, CVE-2020-14776, CVE-2020-14821, CVE-2020-14829, CVE-2020-14848, CVE-2021-2022, CVE-2021-2028, CVE-2021-2048, CVE-2021-2174, CVE-2021-2180, CVE-2021-2194, CVE-2021-2372, CVE-2021-2374, CVE-2021-2389, CVE-2021-2390, CVE-2021-2429, CVE-2020-14791, CVE-2021-2042) * mysql: Server: PS multiple vulnerabilities (CVE-2020-14786, CVE-2020-14790, CVE-2020-14844, CVE-2021-2422) * mysql: Server: Security multiple vulnerabilities (CVE-2020-14800, CVE-2020-14838, CVE-2020-14860) * mysql: Server: Locking multiple vulnerabilities (CVE-2020-14812, CVE-2021-2058, CVE-2021-2402) * mysql: Server: DML multiple vulnerabilities (CVE-2020-14814, CVE-2020-14828, CVE-2021-2056, CVE-2021-2087, CVE-2021-2088, CVE-2021-2166, CVE-2021-2172, CVE-2021-2196, CVE-2021-2300, CVE-2021-2305, CVE-2021-2370, CVE-2021-2440) * mysql: Server: Charsets unspecified vulnerability (CVE-2020-14852) * mysql: Server: DDL multiple vulnerabilities (CVE-2020-14867, CVE-2021-2061, CVE-2021-2122, CVE-2021-2339, CVE-2021-2352, CVE-2021-2399) * mysql: Server: X Plugin unspecified vulnerability (CVE-2020-14870) * mysql: Server: Logging unspecified vulnerability (CVE-2020-14873) * mysql: Server: Replication multiple vulnerabilities (CVE-2021-2002, CVE-2021-2171, CVE-2021-2178, CVE-2021-2202, CVE-2021-2356, CVE-2021-2385) * mysql: C API multiple vulnerabilities (CVE-2021-2010, CVE-2021-2011) * mysql: Server: Components Services unspecified vulnerability (CVE-2021-2038) * mysql: Server: Options unspecified vulnerability (CVE-2021-2146) * mysql: Server: Group Replication Plugin multiple vulnerabilities (CVE-2021-2179, CVE-2021-2232) * mysql: Server: Partition multiple vulnerabilities (CVE-2021-2201, CVE-2021-2208) * mysql: Server: Information Schema multiple vulnerabilities (CVE-2021-2032, CVE-2021-2226, CVE-2021-2301, CVE-2021-2308) * mysql: Server: Packaging unspecified vulnerability (CVE-2021-2307) * mysql: Server: Federated unspecified vulnerability (CVE-2021-2354) * mysql: Server: GIS unspecified vulnerability (CVE-2021-2417) * mysql: Server: Memcached unspecified vulnerability (CVE-2021-2340) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Segfault and possible DoS with a crafted query (BZ#1996699) rocky-linux-8-aarch64-appstream-rpms__mysql mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm e7df893453d68958b2697ccbcb1752533f83e53f24a3d7126ed452d0bf645c6a mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm 0ac811884f2cc859f907f1c6272ee524ba31b137b1c05848e2ec91c2f65aefbf RLBA-2021:3593 gcc-toolset-10-elfutils bug fix update GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix: * The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. Bug fix: * The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Rocky Linux 8.5 from version 8.4. (BZ#2001013) rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-elfutils-0.182-6.el8_4.aarch64.rpm 57c207f89888a063e88c6efbd8a2c3e79cdc950425f7f6a37abd8cccd9f49306 gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.aarch64.rpm f9f41eab26c4e35de81dbdc15d1761263fecc552ee50c483dd2b1d0e30e7ded4 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.aarch64.rpm c4e807587925a2b185b598e13df108b0e919e78c586dd33ea43f4a23f94ba918 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.aarch64.rpm 399f025e2056bf42ab6d009995a3dffa977156eb17138635665806b4852fb2d0 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.aarch64.rpm 93681a96b96026d2921ccd71d87e4cf29c62abb3cdb88fe16e84f3317068466c gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.aarch64.rpm 5ee69a3bdc0e2734462dbabd8150d8aa674aa376b500358901bc6856bbc330c6 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.aarch64.rpm ed9a2a3f889500c67adfe6545ae1eb43e2def3e6538c41e0d5c7c9a7a8972832 RLSA-2021:3623 Important: nodejs:12 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:12/nodejs: Make FIPS options always available (BZ#1993927) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:12/nodejs: Make FIPS options always available (BZ#1993927) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2021:3661 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#2005053) rocky-linux-8-aarch64-appstream-rpms__container-tools containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 RLSA-2021:3666 Important: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: Make FIPS options always available (BZ#1993924) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930) * nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940) * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) * nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931) * nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803) * nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804) * nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939) * nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: Make FIPS options always available (BZ#1993924) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2021:3816 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLSA-2021:3918 Important: redis:5 security update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__redis redis-5.0.3-5.module+el8.5.0+657+2674830e.aarch64.rpm 68295f4d33b0be5eb4e646bc8e27e4a17fc1746eb878b5229c79deec3dcb6624 redis-devel-5.0.3-5.module+el8.5.0+657+2674830e.aarch64.rpm 8718749b4f75ceddb3e372b3f8b97a6b226301b01d186830393319ea039093e7 redis-doc-5.0.3-5.module+el8.5.0+657+2674830e.noarch.rpm cc89c6dc3eb7d9da7535a2c52fd8e647cf7a30943882c964ecfe17691cbd6d78 RLSA-2021:3945 Important: redis:6 security update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__redis redis-6.0.9-5.module+el8.5.0+658+72172854.aarch64.rpm 2cca3a7a625726444ce18d1c2752cd0b9022f688379684def39cb4f47fb86ccc redis-devel-6.0.9-5.module+el8.5.0+658+72172854.aarch64.rpm 8507e7a63b0ae0c90970245c0e101ecf95a1ad5127c8f5c3e570c3bb73af9668 redis-doc-6.0.9-5.module+el8.5.0+658+72172854.noarch.rpm 122e5ea03b660cf7ca8077dfa41fc80b9aa56912ae5939b4f3c2cbd32d0fc4e0 RLBA-2021:4093 container-tools:3.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245) * 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264) * [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * kubelet service fail to load EnvironmentFile due to SELinux denial (BZ#1999245) * 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scope (BZ#1999264) * [RHOSP16.2] podman panic after tripleo_nova_libvirt restart two times (BZ#2011409) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:4094 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Dirsrv memory leak (BZ#2003607) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Dirsrv memory leak (BZ#2003607) rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLSA-2021:4150 Moderate: python36:3.6 security and bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python-sqlalchemy, python-docutils, python-pygments, python-PyMySQL, python-docs, python36, python-virtualenv, python-distro, python-nose, python-wheel, scipy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python36 python36-3.6.8-38.module+el8.5.0+671+195e4563.aarch64.rpm e9f13bbb0496139b0672db90a7404e25ac571065e9a311661e246cfea3e60f36 python36-debug-3.6.8-38.module+el8.5.0+671+195e4563.aarch64.rpm fceee01548bcdb42b3a9c5fffbdf3ec7821489d5bc455df1f7378d393e0f0b09 python36-devel-3.6.8-38.module+el8.5.0+671+195e4563.aarch64.rpm 725f32d54a751b6783b4678475c33ad4682a88986e217fa9a71db31226534901 python36-rpm-macros-3.6.8-38.module+el8.5.0+671+195e4563.noarch.rpm 5d5cb6a94d730cd2f0891c146c7573420dfc826fc93d700ea925410a6ce2dba8 python3-bson-3.7.0-1.module+el8.5.0+671+195e4563.aarch64.rpm 3de89fe5d36287bb8d6c74157cba1b4cf6fbe17f4c1e03ac1d1040e5b0e3d14b python3-distro-1.4.0-2.module+el8.3.0+120+426d8baf.noarch.rpm 434af0836641c43e570795fd204d96b2e8fbbc704ae02d00b4951e506bbfa035 python3-docs-3.6.7-2.module+el8.4.0+597+ddf0ddea.noarch.rpm 08e28b263f66fadd793d215173c60eb57f9b5c5b60ca50327185edd7f160aedc python3-docutils-0.14-12.module+el8.4.0+597+ddf0ddea.noarch.rpm dc7f1a4e658b967feb0eb9c578c30b85c92a7e9def235e4185b73643cc2c3740 python3-nose-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 168de63ea406adedd5a74f273c0b3d1aadc5667d846b3bdba00eeaf589425a78 python3-pygments-2.2.0-22.module+el8.5.0+671+195e4563.noarch.rpm ace34fc5c06e34c0b64edec161daab6c2bf43c1133a4db8114b6703e75938527 python3-pymongo-3.7.0-1.module+el8.5.0+671+195e4563.aarch64.rpm 607a20914f9ed6d85d6fb22a76d69a3bab83c47379aeb08b1bd26873073c84dc python3-pymongo-gridfs-3.7.0-1.module+el8.5.0+671+195e4563.aarch64.rpm 86d26ac3061c8c07993f1ea65a2056d31637013842915f38f9105ffb4469fcae python3-PyMySQL-0.10.1-2.module+el8.4.0+597+ddf0ddea.noarch.rpm f8fc550646c9ac5e7f2c076a7a7a341ce148be616d7e2415ed7ab35157835e00 python3-scipy-1.0.0-21.module+el8.5.0+671+195e4563.aarch64.rpm de55e0483b61b382b92c52c3aa3848faf485e563cab78d7b3531690d954d25f3 python3-sqlalchemy-1.3.2-2.module+el8.4.0+597+ddf0ddea.aarch64.rpm 1fe2e5c3d5840ddb5141a1845ddffe8c88ee30f64ef4906b5853ad9b643794c9 python3-virtualenv-15.1.0-21.module+el8.5.0+671+195e4563.noarch.rpm 7361f47ffdde2c3fa7401442abefe24d77a49f83d37aaa6ca75342c14e89947c python3-wheel-0.31.1-3.module+el8.5.0+671+195e4563.noarch.rpm cbaa19578812079d4740b405915ba967621c5a6fe38e7233768ed66ec63f057b python3-wheel-wheel-0.31.1-3.module+el8.5.0+671+195e4563.noarch.rpm cffee93a34dda22e1c734f372ca0fa49d40d1eeba6f2096c008d4bad7088efbe python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 python-pymongo-doc-3.7.0-1.module+el8.5.0+671+195e4563.noarch.rpm 2e11f6f4f770a9b60d561dc8f80e554fac2919dfc041a3f18639fef6f328838e python-virtualenv-doc-15.1.0-21.module+el8.5.0+671+195e4563.noarch.rpm 6e4ea32c00bc4246b137a8ffcfd8d138ae6f1b9535a1cd45d4097065ad79235f rocky-linux-8-aarch64-appstream-rpms__python27 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b RLSA-2021:4151 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Unsafe use of eval() on data retrieved via HTTP in the test suite (CVE-2020-27619) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python-pygments: Infinite loop in SML lexer may lead to DoS (CVE-2021-20270) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-pygments: ReDoS in multiple lexers (CVE-2021-27291) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python27 babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.aarch64.rpm 94a0af7667b29e361371ee000dac383c0357ad911906b27cb67fd8dcba2fd03b python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 8ccedb9b6934da4f44a44b8ed26c88a3b500efd518f2e23919955b3174b1c7bd python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 82618850ed681c3fb6f5b3c8911b7d924149cf73687bfc5a69ee9cfef1b3108f python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.aarch64.rpm a09b0362a51a0d1e18fe75ed1833a38d34930603682d48fabe7df8d84216b822 python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b rocky-linux-8-aarch64-appstream-rpms__python36 python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 RLEA-2021:4152 modulemd-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for modulemd-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms modulemd-tools-0.7-6.el8.noarch.rpm 01640844480f9cef20b7fa975091cc940229c56a7a70aeda65cbb96e731a77da RLSA-2021:4154 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) * containers/storage: DoS via malicious image (CVE-2021-20291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) * containers/storage: DoS via malicious image (CVE-2021-20291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 RLSA-2021:4160 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.aarch64.rpm 945155b2014169d41094e7435f5f87d32f1051e106387ca6cc8e793f5f4724cc python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.aarch64.rpm a1d3823b13a2340272701cc377c599dc99c444cfbc72ddaa59e8bb49a0be753a python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 0da717455ca0e38a885aa00a9f1ab095e43ad699c0999106516d7c0ee860f51a python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 1359c2457bcf3296afabfa4a3faf9c5852588cb881aca27112612f258f3c5119 python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.aarch64.rpm ba724bda5f89379dc12d94c50dd02ef0cc45d4a2657a311469101a57adbc9866 python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm dc96fad532dd6778a43cab79eca2e80d99d5c3daffd69ea743282f8f1a956422 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 518551ecb5bf3e32fbcf7dcc25feba54c738e86f77d84c1e50ff74e7f5f0f0b6 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 9dc218c0e4d7aa1754732b02593a0f0f727902dba3a3f0d93f95538c5c511ece python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.aarch64.rpm c107d9e7b25869b140877301ac6abefa2d4b9bac14a623975ca7aad2eaf7697f python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.aarch64.rpm b5b8a4573507189006d61b606f716c102e75ad51f13c9a830467cb6bd3f56151 python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLSA-2021:4161 Moderate: python-jinja2 security update The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Security Fix(es): * python-jinja2: ReDoS vulnerability due to the sub-pattern (CVE-2020-28493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-jinja2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Security Fix(es): * python-jinja2: ReDoS vulnerability due to the sub-pattern (CVE-2020-28493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-jinja2-2.10.1-3.el8.noarch.rpm 6624b52c38082ab83ac01bbf3786d69fa2c657891a618341c6ad2fb24eeb69bf RLBA-2021:4163 mariadb-connector-odbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mariadb-connector-odbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mariadb-connector-odbc-3.1.12-1.el8.aarch64.rpm ab67296a8abf33101287012b81d4eaa5de705537ec465a20695268b2b61623bb RLBA-2021:4164 sil-nuosu-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sil-nuosu-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sil-nuosu-fonts-2.200-2.el8.noarch.rpm 1e07923894f365e4800ecd2bb2ab8416f14ce654202bdefcaf651b8bacb6c0ab RLBA-2021:4167 socat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for socat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms socat-1.7.4.1-1.el8.aarch64.rpm ed8ae7deca795b84d87b6808fe4e95193b2ea79b0b48c25c210e43b1bee33264 RLSA-2021:4179 Low: file-roller security update File Roller is an application for creating and viewing archives files, such as tar or zip files. Security Fix(es): * file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for file-roller. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list File Roller is an application for creating and viewing archives files, such as tar or zip files. Security Fix(es): * file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) (CVE-2020-36314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms file-roller-3.28.1-4.el8.aarch64.rpm a532cb5eb36d7049836025a9a44b84c4994aca78d8e6724138388dc23faf6b91 RLBA-2021:4180 evolution, evolution-data-server, evolution-ews bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution, evolution-ews, evolution-mapi, evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms evolution-3.28.5-18.el8.aarch64.rpm c10091c9964ce5cc2240c779bc0ba0c201071cfdbc9caea79ace8e33af4ffd18 evolution-bogofilter-3.28.5-18.el8.aarch64.rpm b0f29a1100eb04140d39df734c870b67ac1bdade34110057ab524db4ebd21cb8 evolution-help-3.28.5-18.el8.noarch.rpm c00ed48438b6959f73c813a2b666c8ef343fc0f3345817aa14fd0921ec2bf0c0 evolution-langpacks-3.28.5-18.el8.noarch.rpm 935263444cac801b4b8cbba1ac49b4a54eb24631c6d1c842f86f752384b04dae evolution-pst-3.28.5-18.el8.aarch64.rpm 2dfd093dc356fea7080a52fc6d856613d39e2e8dcb182f9fdd6e84c017f85877 evolution-spamassassin-3.28.5-18.el8.aarch64.rpm 929855762dc45a4ed56e8d54b8beeca049cbbab6a74d219d4250e8fde4239f16 RLSA-2021:4191 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595) * libvirt: Insecure sVirt label generation (CVE-2021-3631) * libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: net: e1000e: use-after-free while sending packets (CVE-2020-15859) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) (CVE-2021-3592) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) (CVE-2021-3593) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) (CVE-2021-3594) * QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) (CVE-2021-3595) * libvirt: Insecure sVirt label generation (CVE-2021-3631) * libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API (CVE-2021-3667) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLBA-2021:4193 rsyslog and its related dependencies bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsyslog, libfastjson, librelp, liblognorm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libfastjson-0.99.9-1.el8.aarch64.rpm 759b75258315cf32f0f7767c7f5dc5e398768d1dacedf1eb8a9d5ba8a793778c liblognorm-2.0.5-2.el8.aarch64.rpm bdadc14e1be19325f7efcf67e1ad7f7916657a5f4bdca188fec6ceffc210bbea liblognorm-doc-2.0.5-2.el8.aarch64.rpm 3624b5d04f7c9e152dcbb8210607ea37064151eaf1f6dad27c342b9bc85214f4 librelp-1.9.0-1.el8.aarch64.rpm e141b579e8d9d5c2953ed9d987c6680a4c30c6fd00289eae3281f0f17e9a8fb0 RLBA-2021:4195 powertop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for powertop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms powertop-2.14-1.el8.aarch64.rpm bfa76459b7c04ef43d04b9ebf9e37f612e6f7073fe283471e4476c0a3b01cece RLBA-2021:4196 libgweather bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgweather. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libgweather-3.28.2-4.el8.aarch64.rpm 8cf963502425d0fc951fd8846d052b91054e4d5345d9b680c225638686d12323 libgweather-devel-3.28.2-4.el8.aarch64.rpm 1e86e5593aab1e8b852b4b0c80a4a6febb944b306b29d811b24a07005717c716 RLEA-2021:4200 new module: nodejs:16 This enhancement update adds the nodejs:16 module to Rocky Linux 8 as a Technology Preview. A future update will provide a Long Term Support (LTS) version of Node.js 16, which will be fully supported. (BZ#1953991) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. For information on Rocky Enterprise Software Foundation scope of support for Technology Preview features, see Technology Preview Features Support Scope. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the nodejs:16 module to Rocky Linux 8 as a Technology Preview. A future update will provide a Long Term Support (LTS) version of Node.js 16, which will be fully supported. (BZ#1953991) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. For information on Rocky Enterprise Software Foundation scope of support for Technology Preview features, see Technology Preview Features Support Scope. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2021:4201 Moderate: babel security and bug fix update Babel provides tools to build and work with gettext message catalogs, and a Python interface to the CLDR (Common Locale Data Repository), providing access to various locale display names, localized number and date formatting, etc. Security Fix(es): * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for babel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Babel provides tools to build and work with gettext message catalogs, and a Python interface to the CLDR (Common Locale Data Repository), providing access to various locale display names, localized number and date formatting, etc. Security Fix(es): * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-babel-2.5.1-7.el8.noarch.rpm 26dd61290b95ee471a82a445e9af1dc566452d8e92d6d330a03de4eb43e51984 RLBA-2021:4209 redfish-finder bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redfish-finder. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms redfish-finder-0.3-6.el8.noarch.rpm 2816ac8e1697a09d9feb8e393f380209c7b52b005618712e67c33519d83fef84 RLBA-2021:4212 mailman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.aarch64.rpm 3a6c6b144f21d0ccd6730059e9c6ab609375653a1b6aae9e4f2af06387209fbb RLSA-2021:4213 Moderate: php:7.4 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110) Security Fix(es): * php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069) * php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071) * php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068) * php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070) * php: NULL pointer dereference in SoapClient (CVE-2021-21702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.19). (BZ#1944110) Security Fix(es): * php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV (CVE-2020-7069) * php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo (CVE-2020-7071) * php: Use of freed hash key in the phar_parse_zipfile function (CVE-2020-7068) * php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (CVE-2020-7070) * php: NULL pointer dereference in SoapClient (CVE-2021-21702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac RLBA-2021:4216 xorg-x11-font-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-font-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xorg-x11-font-utils-7.5-41.el8.aarch64.rpm 38533cfb55d58a5095cc3cf0df2c32a5e3e342cf14020e5e83b3c78977ed3be7 RLBA-2021:4217 stratis-cli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stratis-cli, stratisd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms stratis-cli-2.4.2-1.el8.noarch.rpm ffe7f009e4a58be113042e2fe76c82c1e815d5a0d2c6c3f807213ce3fda16b19 stratisd-2.4.2-2.el8.aarch64.rpm 29a25540277521657036517628eca8d0d0d27cf52b9bc4f71a6cde009712b78a stratisd-dracut-2.4.2-2.el8.aarch64.rpm 17d44af0388d188f547c6dcd2b14c8d1da3efe675c5707ecfb8f48d93cfc6764 RLBA-2021:4218 udftools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for udftools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms udftools-2.3-2.el8.aarch64.rpm 0e051d4ba2d58136ec89c6fb954e5c5172329273e603839a755b4d288eff9476 RLBA-2021:4219 libinput and libevdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libevdev, libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libevdev-1.10.0-1.el8.aarch64.rpm 5c661690ee0361ebf0e38f885aaf6bb9130dafc7e9ffbe7971fdbaeff02dce67 RLBA-2021:4220 xapian-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xapian-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xapian-core-1.4.18-3.el8.aarch64.rpm 7cae4b8183d38cb54a544730bd60d81aaf82be9df202001139c2ee912d5c00ae xapian-core-libs-1.4.18-3.el8.aarch64.rpm 30417dbe56aa86e8e839636ef5e0af67b5c10e72e336a7579befd2985ad0e5a5 RLSA-2021:4221 Moderate: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.aarch64.rpm 38de2a7e33c1986c26e6f537f419e1b7df4f050cd7bf8eb637ca36d4710cf833 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLSA-2021:4222 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * buildah: Host environment variables leaked in build container when using chroot isolation (CVE-2021-3602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c8bce58bb8faf13610b8212a0398a606c723903d32cdd511d125a492d5140f26 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2021:4224 libwacom bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libwacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libwacom-1.6-3.el8.aarch64.rpm aae51db7035bf1aabdd61d742b6441a6a2eabf880f3cb21afd4ca3698f12f154 libwacom-data-1.6-3.el8.noarch.rpm 7e5450f5dc8a0ebb6181f737709bfa81cd5879251d77ccf6aa28b1b8024e5f11 RLBA-2021:4228 rshim bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rshim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rshim-2.0.5-2.el8.aarch64.rpm aff21142de1d472cfdcabfd23e924b93949d45282b1bae541b5a97691fed13de RLEA-2021:4229 google-noto-emoji-fonts and pango bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-emoji-fonts, pango. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms google-noto-emoji-color-fonts-20200916-2.el8.noarch.rpm 1361deafeac4dd12c648898ddb7d3ecf58becbe687b6da95e3bf1899d1c1c944 google-noto-emoji-fonts-20200916-2.el8.noarch.rpm b8a87ada948fe61bb422a66a54b6b7dae60b63269fd1430cf4d004af12d29ae2 pango-1.42.4-8.el8.aarch64.rpm 92dfee8a42a57a5f76512c0bbd046e247b21130d2307228a245a4612b44a2920 pango-devel-1.42.4-8.el8.aarch64.rpm 7cf7dcb0cdf562e028c923239ce5b73afb1138e30e0605e7ae640370c5f9003f RLBA-2021:4259 new packages: gcc-toolset-11-dyninst GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-dyninst packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-dyninst-11.0.0-2.el8.aarch64.rpm 639e4be87552b9df11086f3da016fb9155b6b89a163391e7a43dad494377de1b gcc-toolset-11-dyninst-devel-11.0.0-2.el8.aarch64.rpm 98761d26e9b0ef7c62eaf584fcfbabef541a993e8cab686db59df0290b3a1765 RLBA-2021:4263 new packages: gcc-toolset-11-valgrind GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-valgrind packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-valgrind-3.17.0-6.el8.aarch64.rpm 28d026841419123488f84c591fc4416cd588626a415898409be123684d94195c gcc-toolset-11-valgrind-devel-3.17.0-6.el8.aarch64.rpm 049c765e590876ae9bf645414ed10922fba3c384ffc47f48b99b43d56ab235b6 RLBA-2021:4264 cloud-utils-growpart bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cloud-utils-growpart. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cloud-utils-growpart-0.31-3.el8.noarch.rpm 18d89bc1cd3b035cf124512c7878cf4e636001bd1cd982efddc321623ae2fe8f RLBA-2021:4266 cldr-emoji-annotation bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cldr-emoji-annotation. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cldr-emoji-annotation-39-2.el8.noarch.rpm 909ccf54467dbdd5edbe12253e5bfcb85367712b47b5e46f139bb8fd50ebbba7 RLBA-2021:4274 new packages: gcc-toolset-11-ltrace GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-ltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-ltrace packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-ltrace-0.7.91-1.el8.aarch64.rpm 77f376196eb53324088637b8d5f2dbfd46352b63419b3edce1f3217ae54411f6 RLEA-2021:4275 postgresql:12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.aarch64.rpm df1a17426addbb4733fd9fab1f0fbbd4dd3f54ef0a1682538a6dd9d8d73d2b4f pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLEA-2021:4276 postgresql:13 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.aarch64.rpm f7bcd5a0f6740a069d1c012096b3edf2721720788607baf4ac42ac5e6d53995d pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLEA-2021:4277 mod_security_crs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_security_crs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mod_security_crs-3.3.0-2.el8.noarch.rpm be66db99becaa558aac5933314c0783c9e43732c0e07a090e039229acde4ff9f RLBA-2021:4279 new packages: gcc-toolset-11-make GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-11-make packages to Rocky Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 11 chapter. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-make-4.3-2.el8.aarch64.rpm 7413effeef1ec04552017b9ce190bf486a34fcb452d2f69dcd5ee32f35710ebc gcc-toolset-11-make-devel-4.3-2.el8.aarch64.rpm c57c9ff4ed42dc6b20d1db2da4f5e2529a0a0df71d8b5225ca381272b9c288f9 RLBA-2021:4280 autoconf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autoconf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms autoconf-2.69-29.el8.noarch.rpm 1a4bd3963411aa30fe199196d2ef58405310adda90a6060903518dfd37892857 RLEA-2021:4282 new module: ruby:3.0 This enhancement update adds the ruby:3.0 module to Rocky Linux 8. (BZ#1938942) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the ruby:3.0 module to Rocky Linux 8. (BZ#1938942) For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.aarch64.rpm dd693d8e37d6dde4f0d72425e0a1dd38ec56c0cba528097859af7fc42c5ea0ec rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.aarch64.rpm 843fe8913c91ea33e7f5020c1a6e6a79b56ae281825b4be911cb6a456332704a rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 RLBA-2021:4285 libvoikko bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvoikko. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libvoikko-4.1.1-3.el8.aarch64.rpm 85f1d9395bb5db30e8f0600d73d05a44b57dd95c80b046501192e2961ead8ce2 voikko-tools-4.1.1-3.el8.aarch64.rpm a9cf858df45d839a0a09baf422acea5d75887d95fed0c4b099590b8815bcd36c RLSA-2021:4288 Moderate: libjpeg-turbo security and bug fix update The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libjpeg-turbo-1.5.3-12.el8.aarch64.rpm 3fbeece5a47b357fc554db059cdaa9595879332ad867e2c49659a7d720242a29 libjpeg-turbo-devel-1.5.3-12.el8.aarch64.rpm e1a7deee9fdeacf0e368463b3693ef55647c5f15c6b2ea65a3a551a677671cf8 libjpeg-turbo-utils-1.5.3-12.el8.aarch64.rpm 2a9bdb12a01fddffc0f60d643411e36be40b4091fa904eee27a8c2a679ae22f4 turbojpeg-1.5.3-12.el8.aarch64.rpm 0f448fb7c2d6f25e70bc5c3555b2d30637bf898ff1f10cc9772d0aea7dfaa776 RLEA-2021:4289 sblim-gather bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-gather. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sblim-gather-2.2.9-24.el8.aarch64.rpm 31d440af756f14d4b0f8a4cfad59f58745dd37cbf05ffe872b4515ba1eeda485 RLSA-2021:4292 Moderate: squid:4 security, bug fix, and enhancement update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384) Security Fix(es): * squid: denial of service in URN processing (CVE-2021-28651) * squid: denial of service issue in Cache Manager (CVE-2021-28652) * squid: denial of service in HTTP response processing (CVE-2021-28662) * squid: improper input validation in HTTP Range header (CVE-2021-31806) * squid: incorrect memory management in HTTP Range header (CVE-2021-31807) * squid: integer overflow in HTTP Range header (CVE-2021-31808) * squid: denial of service in HTTP response processing (CVE-2021-33620) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. The following packages have been upgraded to a later upstream version: squid (4.15). (BZ#1964384) Security Fix(es): * squid: denial of service in URN processing (CVE-2021-28651) * squid: denial of service issue in Cache Manager (CVE-2021-28652) * squid: denial of service in HTTP response processing (CVE-2021-28662) * squid: improper input validation in HTTP Range header (CVE-2021-31806) * squid: incorrect memory management in HTTP Range header (CVE-2021-31807) * squid: integer overflow in HTTP Range header (CVE-2021-31808) * squid: denial of service in HTTP response processing (CVE-2021-33620) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLBA-2021:4298 pyparted bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pyparted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pyparted-3.11.7-4.el8.aarch64.rpm f00fcd04a2441167e6feb9aa439687d88ed034e929a296cbad10639e72bfe7f2 RLBA-2021:4307 ipmitool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipmitool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms exchange-bmc-os-info-1.8.18-18.el8.noarch.rpm 4a31d488720ee841ce30d3bda59e805351b6b7976c20ddc28b4a7d6ea4baa626 ipmievd-1.8.18-18.el8.aarch64.rpm 281ae56873a5c32376fd6fadb10e3395ca4d72626b06a90f5957908b88a61731 ipmitool-1.8.18-18.el8.aarch64.rpm e59cb6e290fe18b0ec2ab32f8e44b708783becc2afb1432d093c57e392c54835 RLBA-2021:4309 python-rpm-generators bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rpm-generators. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-rpm-generators-5-7.el8.noarch.rpm 6a1020de171188f81815c1afd2efd06227d114be9f5f0f83efc47cd45f50884d RLBA-2021:4311 varnish:6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__varnish varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.aarch64.rpm 6edf7f89514193b972b12e7b58fff96b6afed2fd621ef4725857652d095b7648 varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.aarch64.rpm a62ba794c11efdc20c3340a9f993c8446450f1468139b42151596fe4ec8f95b6 varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.aarch64.rpm 6e1b51bd3add4aae2f152e3ecf6309df589d3dbfb0c6efc686b8a539c44dc687 varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.aarch64.rpm 784052816572e4acf6cd5d8f9b62108e132759f87262fad26d6372f681cee205 RLBA-2021:4313 python-ldap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-ldap-3.3.1-2.el8.aarch64.rpm d4e636c15529945545f4bed7b3c050cab0236d4c3b632d27c4e6faaf041f9809 RLSA-2021:4316 Low: zziplib security update The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for zziplib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms zziplib-0.13.68-9.el8.aarch64.rpm 91b17f0b6bd0a13ccd01b83e29990758c22902bfc0f9edcd4e8b6fb08b28d9a0 zziplib-utils-0.13.68-9.el8.aarch64.rpm ac886789eddd77caaa3bea19982ad3c3a484f6a1a201c429133fd1b43cbf2c08 RLBA-2021:4318 apr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms apr-1.6.3-12.el8.aarch64.rpm ecc7145e50272afc104a5ac7188c9445bc742ec79dc07187431f52b08e9003d3 apr-devel-1.6.3-12.el8.aarch64.rpm bc97e8bad5f199dde4902259b0dc90df8c9bc3f927d528afa502d3a255a9ea16 RLEA-2021:4322 unicode-ucd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unicode-ucd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms unicode-ucd-11.0.0-2.el8.noarch.rpm 04bc0503d057701556aad5918d466d41c36877fd58183445017f34175e11a5ad RLBA-2021:4323 saab-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for saab-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms saab-fonts-0.91-18.el8.noarch.rpm c66fe7899c5ac30176a23d20a250b34d63af83382fae61ceec0898c902ab4940 RLSA-2021:4324 Moderate: python-psutil security update psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python. Security Fix(es): * python-psutil: double free because of refcount mishandling (CVE-2019-18874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-psutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list psutil is a module providing an interface for retrieving information on all running processes and system utilization (CPU, memory, disks, network, users) in a portable way by using Python. Security Fix(es): * python-psutil: double free because of refcount mishandling (CVE-2019-18874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-psutil-5.4.3-11.el8.aarch64.rpm fee29de48cbdfd490a37bea0ac9ae59c2ae8190534c4324302bcde9cf4ecde74 RLSA-2021:4326 Moderate: libX11 security update The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libX11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libX11-1.6.8-5.el8.aarch64.rpm f62a577c2a2462f5df1b272da3b881b25c99affde64379f14b0636c0c63b1ef0 libX11-common-1.6.8-5.el8.noarch.rpm 98f5d2c3d2a2da96383645800c79d4794ee2387ad58378e65c16e32d62204190 libX11-devel-1.6.8-5.el8.aarch64.rpm b2a83e3a8fbc50970e2a73b4b7e67ecbf1e9474febc7ca2fe18985874ce6bd9f libX11-xcb-1.6.8-5.el8.aarch64.rpm 5cba1c2224a82e58b2d6260a746d81bf105249d1fd77c48145db9a49ecc2dfff RLBA-2021:4327 perl-GSSAPI bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-GSSAPI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms perl-GSSAPI-0.28-25.el8.aarch64.rpm 14ba694741a8ff2b0e22dce649cd5700ee21b4b644adea27e7b79ad384df7a7e RLBA-2021:4328 scrub bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scrub. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms scrub-2.5.2-16.el8.aarch64.rpm 143f8dcc91f477c0de5223837186183e70f432142ee807fe59470d39fcf9dc51 RLEA-2021:4331 New packages: ansible-collection-redhat-Rocky Linux_mgmt and python-pyghmi For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-collection-redhat-rhel_mgmt, python-pyghmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pyghmi-1.5.29-1.el8.noarch.rpm a5b93ca14507537ff24149b64441a1ce35470a51ecd2686df8b3e769e548cf8d RLEA-2021:4335 tesseract bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tesseract. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tesseract-4.1.1-2.el8.aarch64.rpm f00166cc70e38eb0055d9efcf55b38685299cfa3dbcb8fe44b156736226be6b0 RLBA-2021:4337 numpy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-numpy-1.14.3-10.el8.aarch64.rpm 2002c1c5a13a12c37e21848b59092f508fbd09ed58fa255bc6926421cf89ad98 python3-numpy-f2py-1.14.3-10.el8.aarch64.rpm 60de9248a536b8eee725ffb3ae1a13e1a1baf0651463ee0d0d889b395e50b847 RLBA-2021:4338 python-coverage bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-coverage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms platform-python-coverage-4.5.1-9.el8.aarch64.rpm b23b614cad52924d65c9807f55cc5d56a1c6db33f9821736a0bb48d2faee8f3a python3-coverage-4.5.1-9.el8.aarch64.rpm 5d29f0e44c8a6c1d52a880cef6ccc1ac3c475974fba80aedb436639ca4d352b1 RLSA-2021:4339 Moderate: grilo security update Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grilo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms grilo-0.3.6-3.el8.aarch64.rpm 73117b7c3a57408dfcc06b98789d74cdffb98335fa86d2f8a469ff8ed3476787 RLBA-2021:4350 setroubleshoot-plugins bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setroubleshoot-plugins. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms setroubleshoot-plugins-3.3.14-1.el8.noarch.rpm f22c8a85ae65d42461748dd87cffd48bd13104b11b4b2eefcbae707514129d8c RLSA-2021:4162 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.aarch64.rpm 7b2d3894385ece11897a9697d9f90ed6ce17cda40980d295919369fe140c8b13 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.aarch64.rpm 6b2da5147e67a3a9df2111e9b1bc56adfcd1a3b90eaf479184ebce2d9d49f0e2 python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm 9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.aarch64.rpm 01ffb65f59edcf2309a1e7a1c588c4cb412a5e409d03f14879ae0d0fda0d5e09 python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.aarch64.rpm c2ce2777767146177e0449aa761678a94497ee99d38f4129c09ea78b1f617198 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 19b4eb8c7fc998d915be1de87f41b5aa455bb618b6ef606aac2743a29a108132 python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm bab1991b44f95916cdd7be3a832a779b2479e6a5528706d955f97a3f20cd1761 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 24f2309bb7ba0415cd0e694ee705f32d28a4023a0bc407089cb1cc088cce869c python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.aarch64.rpm ee022e80cc0b6ea0539fd6a02a6e5320596bc8e8d0773b7fc6e9466dcd340cac python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.aarch64.rpm ebe4eccdf7f60bcd962279c10f4b674752dbdb7e3323b7539aa35eb7df6e6203 python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm 3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52 python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm 288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm 67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948 python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08 RLBA-2021:4533 ibus bug fix update The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) rocky-linux-8-aarch64-appstream-rpms ibus-1.5.19-14.el8_5.aarch64.rpm 2f91651b4618365fd449b631912f85c807da99fc57ca569d3f1e71f1065859e9 ibus-gtk2-1.5.19-14.el8_5.aarch64.rpm ca1a38d64a2a3e40d20237f67c802943fa32bc891ec6b6aa8f39289195b6bc33 ibus-gtk3-1.5.19-14.el8_5.aarch64.rpm 30cb68806d0aa14a1854e6ebde9dea9277cb9cf5ad2a817d06d46379ae5a7470 ibus-libs-1.5.19-14.el8_5.aarch64.rpm 1847f8a9513ee395513402e6350dc6027461751d7d5513607c40eb8950edec90 ibus-setup-1.5.19-14.el8_5.noarch.rpm 3023e6ce9e07f6a6740e46d4414d976759674ea8de02e1601e6e87a8e0795e91 ibus-wayland-1.5.19-14.el8_5.aarch64.rpm b21f059f6af7058540caac2ebc66a3d3c991de0e29dbbd8c35bc68408079513d RLSA-2021:4537 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Rocky Linux 8.5 (CVE-2021-20325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLSA-2021:4585 Moderate: gcc-toolset-10-gcc security update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gcc-toolset-10-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-gcc-10.3.1-1.2.el8_5.aarch64.rpm 700b1c5067d7e18513dee52e5f0abedcede5318649b5e0b84d7b0be49f3daf11 gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.aarch64.rpm 53024e87cb1167d43a91569463bcf644790cfd59491103aeb784c3fe413cfda6 gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.aarch64.rpm d1b1ef702494b3ee6360ada460ba05d117c9f076b7a0913bcb22a7bbc3c67fc6 gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.aarch64.rpm 34a634286ca804ccdbb5eb38e0de7d226cbc2ddc2516edc68009f290c022b326 gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.aarch64.rpm 1a769734144fc917f6faff8a640e3271dd8dc25f6c9846faad3b2a776ba9645e gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.aarch64.rpm 956dd9d1c9aa3d1e44eb28533cafa39fd1bb385c1689b455baa2b897ce2d8afb gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.aarch64.rpm ef7dc783ecd70fd1583e05cc724214322dc29ce83362ecd90084b2d875828084 gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.aarch64.rpm 8817888bc178058aca177849a5de951540dbf2ebb629acba2397120c0e4b4154 gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.aarch64.rpm 674504fd8be73286c20c8cbdd7b68a9bd233cadf5dd5f77adce0c965ab4d265a gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.aarch64.rpm a4a088007bf7b7f8e0216eb93e5696c9e5c98671893cd997abc0ebddd87beccd gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.aarch64.rpm adfe0327efe7368c9197b69d5d821e92f30dbf3016723139b70ae08676502902 gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.aarch64.rpm 5a2873f1e6af963fe2d43fa174baa9429387b774186201c93884035f061f063f RLBA-2021:4604 httpd:2.4 bug fix update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2017854, BZ#2017855, BZ#2017856) rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLSA-2021:4826 Important: mailman:2.1 security update Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token derived from admin password allows offline brute-force attack (CVE-2021-42096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.aarch64.rpm 3a6c6b144f21d0ccd6730059e9c6ab609375653a1b6aae9e4f2af06387209fbb RLSA-2021:4916 Important: mailman:2.1 security update Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for mailman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mailman is a program used to help manage e-mail discussion lists. Security Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__mailman mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.aarch64.rpm 3a6c6b144f21d0ccd6730059e9c6ab609375653a1b6aae9e4f2af06387209fbb RLSA-2021:5142 Moderate: idm:DL1 security update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLSA-2021:5171 Moderate: nodejs:16 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.13.1), nodejs-nodemon (2.0.15). (BZ#2027610) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2021:5235 Moderate: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.9). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.9). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.aarch64.rpm df1a17426addbb4733fd9fab1f0fbbd4dd3f54ef0a1682538a6dd9d8d73d2b4f pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLSA-2021:5236 Moderate: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.5). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.5). Security Fix(es): * postgresql: memory disclosure in certain queries (CVE-2021-3677) * postgresql: server processes unencrypted bytes from man-in-the-middle (CVE-2021-23214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.aarch64.rpm f7bcd5a0f6740a069d1c012096b3edf2721720788607baf4ac42ac5e6d53995d pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLSA-2021:5238 Low: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930) * QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c (CVE-2021-3930) * QEMU: net: e1000: infinite loop while processing transmit descriptors (CVE-2021-20257) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2022:0258 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLSA-2022:0290 Important: parfait:0.5 security update Parfait is a Java performance monitoring library that collects metrics and exposes them through a variety of outputs. It provides APIs for extracting performance metrics from the JVM and other sources. It interfaces to Performance Co-Pilot (PCP) using the Memory Mapped Value (MMV) machinery for extremely lightweight instrumentation. Security Fix(es): * log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) * log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Parfait is a Java performance monitoring library that collects metrics and exposes them through a variety of outputs. It provides APIs for extracting performance metrics from the JVM and other sources. It interfaces to Performance Co-Pilot (PCP) using the Memory Mapped Value (MMV) machinery for extremely lightweight instrumentation. Security Fix(es): * log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) * log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__parfait parfait-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm d74b8a16aaf91c0284612b3cf94d57f00f56a475aebb987a125aff36182d21d4 parfait-examples-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm e2383b3c6d55bcf6fedc1010dd22919aa39aae946aa32c5afa6cad5659221d86 parfait-javadoc-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm 20039e3c65483231dbd4992913db91bd8c6e63528fa32fd666ada3b424fc4f92 pcp-parfait-agent-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm 0d23958c274471efff4ddbb52719a5664ccdea76b620f09f43d453ac29c7177d si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm 6d238596ee6d6869db170d90a9e9839e5c028ff1678dc08a7e8378978eb08b0b si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm a20389dc20459d8e277b084b313764a9171b7a63c2a83066dcf5c7de70f09aa5 unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 45f3ea7141aeeab01121669fb9d1c71287d16b63126ead63ee3a0fa485fb6e34 unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm 14e336b8562c8c326f1bf24d01515952681212155fdeee137857ba73261b7b0d uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm 94e383d27797c3563dd284f31e97761f3c859fabd6d43e6e2ddcfe2d66026d59 uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm e28c245a0b6063f0cbae3e3dd0f8512c857d581acd0425605e372967df6e2d61 uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm 665b5f7355b65fd698defae938b12f45a0cbd09982662343e43d1e75bd76c628 uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm 1c5a33c14a4db1f5c1dde1b82c0847034c2b6643969a5d5511dade96439129f9 uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm bb06bb8d9e6d73cf8ed4d8a4c53289397dff79610badd5740d5e98c5250083f5 uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm ff8729c2bfb1bc8ee1d487882734d0e07fcf552e6eb3223b7d2ddd1686880b14 uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm 1bcb94fdab29d21ff7974980bb81f9d5165e81eeeaea52f0360905b1a9f8a187 RLSA-2022:0323 Important: nginx:1.20 security update nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030) Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030) Security Fix(es): * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nginx nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 148d7f985f8035d6371df68e2b60cb7cc1970b62cefab117dbf25f91bb536816 nginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm 7086e83c8fa422089958552247e2ba103f5dc7c0ced95e75eec92411801fceed nginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm fac39bbea57753abe2912b2ba86b7b230c90e2945572328bae797e0f1c95c4ab nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm c6b61d5ba63f5e4aa64029d1ba043ab02a71b63be35e1c604228fcdb5da241d7 nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm f63f391831126dbd3d0f53a7d8e4343688cee64219498ea7b4224f2df8d8e6f8 nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 58d77e46f17c3b23230c6651218d3b16e2c8f84d587b4118c11d6952d10a7d75 nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 6e92eb50e7682c9196fa34334b7f342802e75013cfd9fc153b11d3c0cf07ad46 nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 937c62b2d794de35e167b52a80a0af3728ee796f9ca37e3eda98241ac83f06be RLBA-2022:0348 container-tools:3.0 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c8bce58bb8faf13610b8212a0398a606c723903d32cdd511d125a492d5140f26 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm a5b2c9bf2a92f9533b194472cf1d4a729879513b4796d3720b9ff97def54fec8 toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm ab2e6b9be7a0095f0c39f4b8da200833996f5c78628b8b7f3c3de1aeef9a6e37 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2022:0350 Moderate: nodejs:14 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.18.2), nodejs-nodemon (2.0.15). (BZ#2027609) Security Fix(es): * nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918) * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701) * nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712) * llhttp: HTTP Request Smuggling due to spaces in headers (CVE-2021-22959) * llhttp: HTTP Request Smuggling when parsing the body of chunked requests (CVE-2021-22960) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLEA-2022:0352 container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 RLBA-2022:0357 pki-core:10.6 bug fix and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es) and Enhancement(s): * Reinstall of the same ipa-replica fails with 'RuntimeError: CA configuration failed.' (BZ#2024676) * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2029023) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tomcatjss, jss, pki-core, ldapjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es) and Enhancement(s): * Reinstall of the same ipa-replica fails with 'RuntimeError: CA configuration failed.' (BZ#2024676) * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2029023) rocky-linux-8-aarch64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f RLBA-2022:0361 virt:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2022:0418 Important: varnish:6 security update Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/1 request smuggling vulnerability (CVE-2022-23959) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__varnish varnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.aarch64.rpm 6edf7f89514193b972b12e7b58fff96b6afed2fd621ef4725857652d095b7648 varnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.aarch64.rpm a62ba794c11efdc20c3340a9f993c8446450f1468139b42151596fe4ec8f95b6 varnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.aarch64.rpm 6e1b51bd3add4aae2f152e3ecf6309df589d3dbfb0c6efc686b8a539c44dc687 varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.aarch64.rpm 784052816572e4acf6cd5d8f9b62108e132759f87262fad26d6372f681cee205 RLSA-2022:0441 Important: aide security update Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for aide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms aide-0.16-14.el8_5.1.aarch64.rpm a32c14e2ab712fb56883123a64e80081312bcd1a5f6a9d3f38f6fdcde658d43b RLSA-2022:0543 Important: ruby:2.6 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.aarch64.rpm 3a517bbe26ade13a9b023fd013c0f7887633c4dabc04dd328edf37a7a2ded43a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.aarch64.rpm fc764cf9237a3d754448a117e5c736df0ee282b2b04dc86b46672edfc8e14e3c rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 RLSA-2022:0545 Important: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.aarch64.rpm d6e83db1ed53961b708866292cbcde971a111734e3b552032fcb204101e1dfdc rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLSA-2022:0643 Important: python-pillow security update The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms python3-pillow-5.1.1-18.el8_5.aarch64.rpm 5ba0f740bfa6a544ede47a03dcdce51af6efe2427148f62814b56a5223bc6e85 RLSA-2022:0672 Moderate: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799) * ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810) * ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.aarch64.rpm d6e83db1ed53961b708866292cbcde971a111734e3b552032fcb204101e1dfdc rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 RLBA-2022:0882 redhat-support-lib-python and redhat-support-tool bug fix and enhancement update The redhat-support-tool utility facilitates console-based access to Rocky Enterprise Software Foundation's subscriber services and gives Rocky Enterprise Software Foundation subscribers more venues for accessing the content and services available to them as Rocky Enterprise Software Foundation customers. Further, it enables Rocky Enterprise Software Foundation customers to integrate and automate their helpdesk services with our subscription services. The redhat-support-lib-python package provides a Python library that developers can use to easily write software solutions that leverage Rocky Enterprise Software Foundation Access subscription services Bug Fix(es) and Enhancement(s): * Add support to upload to and download from S3 (BZ#2028540) * Add support to upload to and download from S3 (BZ#2028543) * Add support for handling JSON response from API's (BZ#2028546) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028550) * Add support for handling JSON response from API's (BZ#2028553) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028556) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redhat-support-tool, redhat-support-lib-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The redhat-support-tool utility facilitates console-based access to Rocky Enterprise Software Foundation's subscriber services and gives Rocky Enterprise Software Foundation subscribers more venues for accessing the content and services available to them as Rocky Enterprise Software Foundation customers. Further, it enables Rocky Enterprise Software Foundation customers to integrate and automate their helpdesk services with our subscription services. The redhat-support-lib-python package provides a Python library that developers can use to easily write software solutions that leverage Rocky Enterprise Software Foundation Access subscription services Bug Fix(es) and Enhancement(s): * Add support to upload to and download from S3 (BZ#2028540) * Add support to upload to and download from S3 (BZ#2028543) * Add support for handling JSON response from API's (BZ#2028546) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028550) * Add support for handling JSON response from API's (BZ#2028553) * RHST should use new Rocky Enterprise Software Foundation Secure FTP instead of dropbox for attachments (BZ#2028556) rocky-linux-8-aarch64-appstream-rpms redhat-support-tool-0.13.0-0.el8_5.noarch.rpm d08b6effb550f05dc9fe44817af7b6f66c20cab1dc7a1f6f639f046f0e8cd2e4 redhat-support-lib-python-0.13.0-0.el8_5.noarch.rpm a3713475fe27990e2a8dc87fbc2deea8afae8e7fffa8ae2cfc144982b1698c06 RLSA-2022:0886 Moderate: virt:rhel and virt-devel:rhel security update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 (CVE-2022-0358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2022:0891 Moderate: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLSA-2022:1049 Important: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLSA-2022:1556 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514) * MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532) * Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533) * Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34). (BZ#2050543) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050514) * MariaDB logrotate leads to "gzip: stdin: file size changed while zipping" (BZ#2050532) * Crash: WSREP: invalid state ROLLED_BACK (FATAL) (BZ#2050533) * Galera doesn't work without 'procps-ng' package MariaDB-10.3 (BZ#2050550) rocky-linux-8-aarch64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a RLSA-2022:1557 Moderate: mariadb:10.5 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515) * mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524) * Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9). (BZ#2050546) Security Fix(es): * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2154) * mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (CVE-2021-2166) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2372) * mysql: InnoDB unspecified vulnerability (CPU Jul 2021) (CVE-2021-2389) * mysql: InnoDB unspecified vulnerability (CPU Oct 2021) (CVE-2021-35604) * mariadb: Integer overflow in sql_lex.cc integer leading to crash (CVE-2021-46667) * mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref (CVE-2021-46657) * mariadb: save_window_function_values triggers an abort during IN subquery (CVE-2021-46658) * mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries (CVE-2021-46662) * mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause (CVE-2021-46666) * mariadb: No password masking in audit log when using ALTER USER <user> IDENTIFIED BY <password> command (BZ#1981332) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgrade (BZ#2050515) * mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnel (BZ#2050524) * Galera doesn't work without 'procps-ng' package MariaDB-10.5 (BZ#2050542) rocky-linux-8-aarch64-appstream-rpms__mariadb Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a RLBA-2022:1560 pki-core:10.6 bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es): * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2061458) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tomcatjss, jss, pki-core, ldapjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Bug Fix(es): * ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403) (BZ#2061458) rocky-linux-8-aarch64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f RLBA-2022:1561 idm:DL1 bug fix update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Error replacing a replica with CentOS Stream 9 (BZ#2062404) * reinstalling samba client causes winbindd coredump (BZ#2065719) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Error replacing a replica with CentOS Stream 9 (BZ#2062404) * reinstalling samba client causes winbindd coredump (BZ#2065719) rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLBA-2022:1563 virt:rhel and virt-devel:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, nbdkit, libguestfs-winsupport, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es): * KVM Fedora 35 guest x86 programs randomly crash in signal handler (BZ#2065239) rocky-linux-8-aarch64-appstream-rpms__virt libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 RLSA-2022:1565 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 3.0 stable stream: podman run --pid=host command causes OCI permission error (BZ#2070961) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c8bce58bb8faf13610b8212a0398a606c723903d32cdd511d125a492d5140f26 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.aarch64.rpm d265cd7a3d56fd2b95918ff1066f55d950833d6fbe7766873f7e4ead8d3b3fbd slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm a5b2c9bf2a92f9533b194472cf1d4a729879513b4796d3720b9ff97def54fec8 toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm ab2e6b9be7a0095f0c39f4b8da200833996f5c78628b8b7f3c3de1aeef9a6e37 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2022:1566 Moderate: container-tools:2.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, python-podman-api, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools buildah-1.11.6-10.module+el8.5.0+770+e2f49861.aarch64.rpm 30326cf7f192a976ee2f7be764d3415cef9e8b40f06de2de2f869fbadbe44cdb buildah-tests-1.11.6-10.module+el8.5.0+770+e2f49861.aarch64.rpm 355f9af029802c262980c728e3d7012bac242a6d7c8de77439d1f8f028f8d567 cockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm 810afcbb293a9e00b08db1dba639f52108a1c6a88c424ce65845fae623cfdc46 conmon-2.0.15-1.module+el8.5.0+770+e2f49861.aarch64.rpm 09b7cdb529c6eb8424eee99dfd1d987700986cc0984e6fc4abc6dc54cdf07a45 containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.aarch64.rpm 41e0812a3c0046c0a1fd7b63c3eac1daa9480580e5e5fd81bd7cd987b6452563 containers-common-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e1829360a76043263b9df0428304f2214b7d7fd3a1a70cc1ee18568142f8e78c container-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm 8182453c9559ea06b055e773d7c0b39aa320f9c290801879fd4f610c0c252948 crit-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm f32ffac62901f3861689df2a42818c6d8fe08eb02ba0c67769500e2ea44314ee criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 224fe3aad3d4f7d512ccc6808f2d85f0cc9902aaef5bcc5958ce0e9757bc3c02 fuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.aarch64.rpm ba841176eb7c3094f6fa00d4243b497449fdd31ae3aa51114696959aace69524 podman-1.6.4-28.module+el8.5.0+770+e2f49861.aarch64.rpm e1eec26e6d10cd56e8ec0501e1997591a74d9ed99615523ad3580ba05405f5bf podman-docker-1.6.4-28.module+el8.5.0+770+e2f49861.noarch.rpm 06f24ab416c7a333cca3796d9702eb1adf49c4ccb9595715dda0cfd6e0b64158 podman-remote-1.6.4-28.module+el8.5.0+770+e2f49861.aarch64.rpm 71c3300d0a766752416ce7b5156cb1bf8ea2ad515fd3af787f7ac1d4e2372e8c podman-tests-1.6.4-28.module+el8.5.0+770+e2f49861.aarch64.rpm 15b1a8dd36d9e4c730499db3b37248e1c757f7238cd9e7d5a62b3a9bd15dac27 python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.aarch64.rpm 3ecd545610d909e943fa18e09828621e0a878209a32d6ad230580173a49613ca python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm 483778e2081efaada05d1ef693cb0d09df6ba975e5fb8a3f8afc362b0f37ae00 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.aarch64.rpm 38de2a7e33c1986c26e6f537f419e1b7df4f050cd7bf8eb637ca36d4710cf833 skopeo-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm b7c85422cf75ac561e851d2d9236eba6c7251b3832be782499f6d65c5bcf93e2 skopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.aarch64.rpm e424bede3a11575df49cd5bfb951f70a3c8f86a2bef0e1861c97fa5cd6bcb798 slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.aarch64.rpm f50c04ac0b017e77f8e00ce86746c330299b6c73d138cfbbdb72736fbd0429ea toolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm c3f34ad60fde1553040f63f3dfc6c5eef8445f9fb4be69b3bd97f4a57fbeead2 udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm d60f662eba35b77706bb7f686b49790343a110998185e8c28e9d4710c0571146 RLBA-2022:1761 gcc-toolset-11-gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-gcc-gdb-plugin-11.2.1-9.1.el8.aarch64.rpm 1c5cb577c4e28e99aa77a57c806e100e3b7e6e63d7871f7d89a7d6af457bfb09 gcc-toolset-11-libatomic-devel-11.2.1-9.1.el8.aarch64.rpm 2a5a3c584bf4986283dbbcdae2eaf230fd9e400ce996eb2924d8012d95865a1d gcc-toolset-11-gcc-11.2.1-9.1.el8.aarch64.rpm e5f71b8753032f01012b8bb27d53df1f87244a74b12285d278b27651f7eb4696 gcc-toolset-11-gcc-c++-11.2.1-9.1.el8.aarch64.rpm 4c3cd89ee494b8cc0ed4354c804fb6fffeeb478e6d0efafe55a8f9f45e118c22 gcc-toolset-11-gcc-gfortran-11.2.1-9.1.el8.aarch64.rpm f253f33e015030b2a77e72766d53db84976718c1cb32d26791955008d6c90c9f gcc-toolset-11-gcc-plugin-devel-11.2.1-9.1.el8.aarch64.rpm 3839b4eb8bcdf23f16d80b87816cc1a1e030400547bebcf6e38d2d297f6a9386 gcc-toolset-11-libasan-devel-11.2.1-9.1.el8.aarch64.rpm 212172539c4138587e8a5648b6b31c4b78778919efc78eea678197938a4e9e4b gcc-toolset-11-libgccjit-11.2.1-9.1.el8.aarch64.rpm 27a252bb5b2918d899bb2c333be6e3acbe764ed13edfb6f53725cba06fe17955 gcc-toolset-11-libgccjit-devel-11.2.1-9.1.el8.aarch64.rpm 2c9f3f4e155f041f13843c7f7720e0e497747f3acaef75ee57fde73839982ddd gcc-toolset-11-libgccjit-docs-11.2.1-9.1.el8.aarch64.rpm 7dee1fe5ba3e6504903f96474f76d7e553b85ffeb14cb89cdf8394d458b82ca9 gcc-toolset-11-libitm-devel-11.2.1-9.1.el8.aarch64.rpm b6b06600433dad81adb973097bdd3fe0fd647d05b81d60be64a03d13ffd3dc59 gcc-toolset-11-liblsan-devel-11.2.1-9.1.el8.aarch64.rpm 25cdddb15e9160c703d477c5404fa379db92d990d9ad2449f9d8dddbbba196e4 gcc-toolset-11-libstdc++-devel-11.2.1-9.1.el8.aarch64.rpm 6600883977fc8bc3bc11dd9d74359afba249a0fb62a2da6bcc465028ac969954 gcc-toolset-11-libstdc++-docs-11.2.1-9.1.el8.aarch64.rpm 3d83511a88affb4c14825f55bf1212adb4c72f5c48a6c24e1d4a4a8cb787cbf4 gcc-toolset-11-libtsan-devel-11.2.1-9.1.el8.aarch64.rpm eae563012c442cf52cf242ab6b5253f8262cfeb7acea62cdd2112e372f5cd67b gcc-toolset-11-libubsan-devel-11.2.1-9.1.el8.aarch64.rpm adbdeb958f47f4ff0d3c3686c2aa6e3bb07a1a7445bf96d0a62df9a0acc7d5b3 libasan6-11.2.1-9.1.el8.aarch64.rpm 2a0c7762fce972b5cdbcede418623060d1cc9f6fec13a8c5c5f3ff3ffaccf466 RLSA-2022:1764 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python38 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.aarch64.rpm 7b2d3894385ece11897a9697d9f90ed6ce17cda40980d295919369fe140c8b13 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.aarch64.rpm fbb90dcc33905a962d5b0c402c7c868d78deb85c2e5dc1b1065b04836d534cfe python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.aarch64.rpm 6b2da5147e67a3a9df2111e9b1bc56adfcd1a3b90eaf479184ebce2d9d49f0e2 python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm 9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.aarch64.rpm 01ffb65f59edcf2309a1e7a1c588c4cb412a5e409d03f14879ae0d0fda0d5e09 python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.aarch64.rpm c2ce2777767146177e0449aa761678a94497ee99d38f4129c09ea78b1f617198 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 19b4eb8c7fc998d915be1de87f41b5aa455bb618b6ef606aac2743a29a108132 python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm bab1991b44f95916cdd7be3a832a779b2479e6a5528706d955f97a3f20cd1761 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 24f2309bb7ba0415cd0e694ee705f32d28a4023a0bc407089cb1cc088cce869c python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.aarch64.rpm ee022e80cc0b6ea0539fd6a02a6e5320596bc8e8d0773b7fc6e9466dcd340cac python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.aarch64.rpm ebe4eccdf7f60bcd962279c10f4b674752dbdb7e3323b7539aa35eb7df6e6203 python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm 3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52 python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm 288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm 67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948 python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08 RLBA-2022:1770 evince bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evince. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms evince-libs-3.28.4-16.el8.aarch64.rpm 781ea08bc8d896b6c78b09c19370762ab60ef7c2c1ecd925e350f73d245202b4 evince-3.28.4-16.el8.aarch64.rpm b77d907e9d0b2495e5609acf5ee82e6f921431e012977e7c2112bdc9f9f4a1a1 evince-browser-plugin-3.28.4-16.el8.aarch64.rpm 6d10d54f826809d9a2bb794754c261df0fd279bc2668b118c7f7c5d9853ed05c evince-nautilus-3.28.4-16.el8.aarch64.rpm 2172f904649fbedb1bbcff3be92a2ede7095942d1d3a62cd15dcc05d48b35535 RLBA-2022:1784 js-d3-flame-graph bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for js-d3-flame-graph. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms js-d3-flame-graph-4.0.7-1.el8.noarch.rpm a10198dd214d7c058c6210e5532acf0092dd08731dc079d8912f46fc89b56699 RLBA-2022:1789 certmonger bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for certmonger. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms certmonger-0.79.13-5.el8.aarch64.rpm e4a35136824b5cd967095d8de77709fe504578665a3bf64d3c8aae1eb6efb42e RLBA-2022:1790 libpinyin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpinyin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libpinyin-2.2.0-2.el8.aarch64.rpm 290fcf1cd9695e5482d51ac8821b8e180845f7abf1ea0581b153a12e981d9727 libpinyin-data-2.2.0-2.el8.aarch64.rpm b6d38edda918f7f0c61074c82ede2c805a12ddb68aa9e92ea387def4551038d5 libzhuyin-2.2.0-2.el8.aarch64.rpm 74acf70bc04898bfec4b7e86afd7da30fb615e658f25936a78763539f48d3b17 RLBA-2022:1794 libmemcached bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmemcached. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libmemcached-1.0.18-17.el8.aarch64.rpm 87c7df2998fb18b2a2b733b92f27f02334a74066f037b2696404197b0f6d1020 libmemcached-libs-1.0.18-17.el8.aarch64.rpm 855e5012854a6869ecc048880fa7f6e79ce557f160c2a3fd56efbc593aff3891 RLBA-2022:1800 accountsservice bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for accountsservice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms accountsservice-0.6.55-4.el8.aarch64.rpm bd16e9d508f81cb1731414ed0db94fe8d509b6cea1c1062c2e761e1ca79a559a accountsservice-libs-0.6.55-4.el8.aarch64.rpm 32ab30bfab61f27b849b55e441414651a6c223cd9dc962d00fe439b7faaa941b RLBA-2022:1818 libnotify bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnotify. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libnotify-0.7.7-6.el8.aarch64.rpm fae47e15b722ec53077bbfb96a0aab97b124deeaf275c57587a1673a8a400e11 libnotify-devel-0.7.7-6.el8.aarch64.rpm 357035211adcda018bdc0e9a58ee7f345020609d2a0cd3442c82384fd8bed767 RLBA-2022:1822 ibus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ibus-libs-1.5.19-14.el8_5.aarch64.rpm 1847f8a9513ee395513402e6350dc6027461751d7d5513607c40eb8950edec90 ibus-1.5.19-14.el8_5.aarch64.rpm 2f91651b4618365fd449b631912f85c807da99fc57ca569d3f1e71f1065859e9 ibus-gtk2-1.5.19-14.el8_5.aarch64.rpm ca1a38d64a2a3e40d20237f67c802943fa32bc891ec6b6aa8f39289195b6bc33 ibus-gtk3-1.5.19-14.el8_5.aarch64.rpm 30cb68806d0aa14a1854e6ebde9dea9277cb9cf5ad2a817d06d46379ae5a7470 ibus-setup-1.5.19-14.el8_5.noarch.rpm 3023e6ce9e07f6a6740e46d4414d976759674ea8de02e1601e6e87a8e0795e91 ibus-wayland-1.5.19-14.el8_5.aarch64.rpm b21f059f6af7058540caac2ebc66a3d3c991de0e29dbbd8c35bc68408079513d RLSA-2022:1823 Moderate: mod_auth_openidc:2.3 security update The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) * mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) * mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) * mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: open redirect in oidc_validate_redirect_url() (CVE-2021-32786) * mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption (CVE-2021-32791) * mod_auth_openidc: XSS when using OIDCPreservePost On (CVE-2021-32792) * mod_auth_openidc: open redirect due to target_link_uri parameter not validated (CVE-2021-39191) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 167194b776db1036319dda56b06909ff2660411660b1904aa3744804890143c5 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 147c2a485b610d217ea9d1b92fce09583e1eeeebf7c1ac0d792ec5e61cf8c508 RLBA-2022:1827 librdkafka bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librdkafka. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms librdkafka-0.11.4-3.el8.aarch64.rpm 1c45c9ab1c3a22460210ea2cb971f3fad16a1f8818e202dd89135b4969ad0f1e RLBA-2022:1829 virt-viewer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-viewer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms virt-viewer-9.0-12.el8.aarch64.rpm aa37e97cb5ac76532d485dbbdc6427b83ef9f8679c94ceae71781707dd3e2673 RLBA-2022:1834 pesign bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pesign. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms pesign-0.112-26.el8.aarch64.rpm f1417043fcec4a18b4a3080370fda5e42e09c3f322469d76a5ed32b6b3449c49 RLBA-2022:1836 redhat-support-lib-python bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redhat-support-tool, redhat-support-lib-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms redhat-support-lib-python-0.13.0-0.el8_5.noarch.rpm a3713475fe27990e2a8dc87fbc2deea8afae8e7fffa8ae2cfc144982b1698c06 redhat-support-tool-0.13.0-0.el8_5.noarch.rpm d08b6effb550f05dc9fe44817af7b6f66c20cab1dc7a1f6f639f046f0e8cd2e4 RLBA-2022:1838 nss-pam-ldapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nss-pam-ldapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nss-pam-ldapd-0.9.9-5.el8.aarch64.rpm 2a55b447fbb77ca1c0d07b36e1e5d27e1df205ee5fffbc9de71b3f40a7853a5d RLSA-2022:1842 Moderate: exiv2 security, bug fix, and enhancement update Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms exiv2-0.27.5-2.el8.aarch64.rpm d338b89fa3c9541f76be066e7404900fa11789b454913297170f8c1847d39bef exiv2-libs-0.27.5-2.el8.aarch64.rpm 1d26a77e40ad1eba109f1a69828ba6df8f9db9f586c5b383806b0b6b38d54812 RLBA-2022:1855 mesa and related packages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdrm, libglvnd, mesa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libglvnd-1.3.4-1.el8.aarch64.rpm 74b1a895067f951147e66d1474ae2b21d16d4efa5c82a61a263f479ff3ae9a83 libglvnd-core-devel-1.3.4-1.el8.aarch64.rpm 4d4e54d76a4ffb2501c8a98e954acf8054592d79bb2ef91d34eefc413f371408 libglvnd-devel-1.3.4-1.el8.aarch64.rpm 1deb51939a8795dab71f9dc1ce199c2a6d087a77c606e54ba6de1b22ebccd2a7 libglvnd-egl-1.3.4-1.el8.aarch64.rpm 0aca259f99d91e8cda343556f736dfd7fd304dabced133384e1bb0f76fe8b686 libglvnd-gles-1.3.4-1.el8.aarch64.rpm 2514c83cf925626c76cbffcabba0aec2b57e25c85942c81a7ea4b90ca8dffaa0 libglvnd-glx-1.3.4-1.el8.aarch64.rpm d8c42ffa9139352bc42d69d6929c00430b905105002b72faac2cc1b8d1e35c28 libglvnd-opengl-1.3.4-1.el8.aarch64.rpm 1cf087e0224cd35a1293f570bf126b738a88d4cb49c44fd53298d5c8d4d7499f RLBA-2022:1868 freeradius:3.0 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeradius. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__freeradius freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 00b2dd9a08e57d7a5f12b921c76df82101821e375953521e80866ed9d3b05e2d freeradius-devel-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm ffa7644420413013f1b9cbf42ab0d089fe869e68ec5ef1d5bbb8f0523ffd4c98 freeradius-doc-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm bc820fc8bf41713cfeb59b8630ea47d4be28416249f8f4420a46b84c2e61e98d freeradius-krb5-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 284d33cedc4f5bd19c7f7dc2e64a88cde2aa8cbd998cfe3f526d17e8e61a7dac freeradius-ldap-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 1e81185b55e89937684b0b0328cb8cf75f4732b70a0bdce7ecc5a571ef923697 freeradius-mysql-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 3a254b0ac5ff2fd614e414826626d7136c69a968e619a6b0c3a6f4834150afe2 freeradius-perl-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 9df2fb4421fb1cc86a399746eda5a24efa36a72e6964832c22c139af11a8a1f7 freeradius-postgresql-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 8772fc9a99e69a0b55c2c53859ed696d39d0f8bc2c075ff600a9eb9c8b05fdde freeradius-rest-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 97a5334e4b601e3b8fa67d08e9fe57b2556d9c22db08abe821777ce9cd98c361 freeradius-sqlite-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 8925e7c8c12cf5a250575c3ab65675464fada15be49734653ab8b18845c1d338 freeradius-unixODBC-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 9696f5a2f142132a9a9d0585ad6a62a9303640f15539f81336c06d68b8e0354e freeradius-utils-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm 19da59168cd5070036a90c0ee3316096954d8fcae53dcd62e641311e87a806e9 python3-freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.aarch64.rpm d3d3e8459efb18bba647bc23a25909e869548c91b33de5bb130a8c26a77df2b8 RLBA-2022:1871 corosync bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for corosync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms corosynclib-3.1.5-2.el8.aarch64.rpm 3e1717dc6f3b6dddf168ff9ac117bf0d6733bc1ba357d72a56c07490b1ac7415 RLBA-2022:1872 gcc-toolset-10-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-binutils-2.35-11.el8.aarch64.rpm 1464cf83a3b1a690c7bb28196e94e7ce1da4126d2cf90dad687e40f854c94ccf gcc-toolset-10-binutils-devel-2.35-11.el8.aarch64.rpm 839867806cc6a5f70feb4751b9339e7489e0243a5ee5142102aa6e46b15a9a9f RLBA-2022:1873 gcc-toolset-11-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-binutils-2.36.1-2.el8.aarch64.rpm c4f0a6f1e4fb78979ecb175c81b1b0790db0cc90df0ccf618fccafdaca1a68d4 gcc-toolset-11-binutils-devel-2.36.1-2.el8.aarch64.rpm d8f446ba31b13792b877c4d63403d1fe9d4598ba9fd53bfdc834d2ef996ca72f RLSA-2022:1891 Low: libpq security update The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libpq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq processes unencrypted bytes from man-in-the-middle (CVE-2021-23222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libpq-13.5-1.el8.aarch64.rpm 83c1d82bf520d254607c8c42e5223ddbfea54fe04f0c11b6287d147094d5d7cc libpq-devel-13.5-1.el8.aarch64.rpm 77bcdec31eeedf014085bed46b2f190c4f59e656262b747c854816e9c0d76325 RLBA-2022:1895 libecpg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libecpg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libecpg-13.5-3.el8.aarch64.rpm e658a0037265b7741022cdacad866822579c8c7ef4d38abfbe87a1a97f214480 libpgtypes-13.5-3.el8.aarch64.rpm 41ae241a2d043c8fadbbb88487cb2fc79b8c5c1afdc2783e27c53ebd46b4ad3c RLBA-2022:1899 spamassassin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spamassassin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spamassassin-3.4.6-1.el8.aarch64.rpm fdea0f2a6223cd3066288c6a17c1ed4c8c14d193f8183f50724c272a2e0b8913 RLBA-2022:1905 gcc-toolset-11-gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-gdb-10.2-5.el8.aarch64.rpm 558fc7ef58c0eb8f59f5a2df75bcf1082653b6d5e7aaf2f2e9ab278ddf854f46 gcc-toolset-11-gdb-doc-10.2-5.el8.noarch.rpm 69f2d660a0b8bba2d069e2fbb00a66b15087eb0a64b4d0d73bdcb0d59e0affcd gcc-toolset-11-gdb-gdbserver-10.2-5.el8.aarch64.rpm cf028c6fe6853e44d50a451fd4f9daa9514a7fb49f2faf75b9dfe9844e8a6cbb RLBA-2022:1922 mdevctl bug fix and enhancement update The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdevctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel. rocky-linux-8-aarch64-appstream-rpms mdevctl-1.1.0-2.el8.aarch64.rpm 365a4a185ac556e4e40447b197a85fa6e898c12bf733c5aa75071b11fdd843ab RLBA-2022:1927 mozilla-filesystem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mozilla-filesystem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mozilla-filesystem-1.9-19.el8.aarch64.rpm 7f296ffaf278ab41dfa878ec364a22378385f09eeab1723f7fff2038ba102504 RLSA-2022:1935 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Local privilege escalation via PHP-FPM (CVE-2021-21703) * php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Local privilege escalation via PHP-FPM (CVE-2021-21703) * php: SSRF bypass in FILTER_VALIDATE_URL (CVE-2021-21705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac RLBA-2022:1937 gcc-toolset-11 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-11.1-1.el8.aarch64.rpm 48853c3738f3b44fbb635eb4851dbbafef4f3b0ffac9df18cb8e2a624e39ea42 gcc-toolset-11-build-11.1-1.el8.aarch64.rpm 9ebdf14376884367b1bf7005b08407808325922f188e11fcde404bf69e3e44fb gcc-toolset-11-perftools-11.1-1.el8.aarch64.rpm 3e3e97eb4c9f7f020d3b62c2200574b6450959deb12782ae20040571e4774ec8 gcc-toolset-11-runtime-11.1-1.el8.aarch64.rpm 852b5f7bb2610027ce10e4099b8c1b0abf577109de62f5fcc3b0cd2cb3cbc05e gcc-toolset-11-toolchain-11.1-1.el8.aarch64.rpm c6f0a175f75e4aa1cd076723bd38e4632f0f029dd41c5fd66a61fc3a86818b09 RLSA-2022:1939 Moderate: squid:4 security and bug fix update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: out-of-bounds read in WCCP protocol data may lead to information disclosure (CVE-2021-28116) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.aarch64.rpm a4273c8250a4e1573877918e02f150b4d9759766a36388ed81bac5cea89327b3 RLSA-2022:1964 Moderate: fetchmail security update Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client. Security Fix(es): * fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386) * fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fetchmail. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Fetchmail is a remote mail retrieval and forwarding utility intended for use over on-demand TCP/IP links, like SLIP or PPP connections. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN, IPv6, and IPSEC) for retrieval. Then Fetchmail forwards the mail through SMTP so the user can read it through their favorite mail client. Security Fix(es): * fetchmail: DoS or information disclosure when logging long messages (CVE-2021-36386) * fetchmail: STARTTLS session encryption bypassing (CVE-2021-39272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fetchmail-6.4.24-1.el8.aarch64.rpm 0ffa793b2270e81b2e99b1155405e6e4e51861e8862402a7a620acafa844796d RLBA-2022:1965 plymouth bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for plymouth. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms plymouth-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 2f6ca4ee123042e07bb58aaa2529db43e2fd799d5f615e6bdcecc02180defcdf plymouth-core-libs-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 3cc179879001574fafbd9287f2b943123a0c852397e14d1e65e393af6846878c plymouth-graphics-libs-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 4b8e48f122c5679c5dae363d0a2b96e61bb64903405292c67294d17c3ce9c063 plymouth-plugin-fade-throbber-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm b00bfd9ec1066fcbee56c0dc1007e7b7812ab8e080eb077b2e320c9b8b01758d plymouth-plugin-label-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 4f8983524963129f31f41b1d559e9b2b371861129377a12b415a36e21192887e plymouth-plugin-script-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm e23e3f66c6991acd14a7cc441e8f4dfe6b03fa53b52e948ca85f97d98c22f0d2 plymouth-plugin-space-flares-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm ef7960f5e033a28920300fc33573594e326c66535c3a12b9f82fa6b52c88df4d plymouth-plugin-throbgress-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 6c6c9210a87127c3ec3998d32a07e99f36352951bd238f6f0986261ce9dd01af plymouth-plugin-two-step-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 6e1548b1579cd870014ae2d1880240da8d8e0372e3d412f26a011d1660df4f8f plymouth-scripts-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 46450c6292bd6c99c1dba8d870eca79497ba571eedfa97f1aa3292818931ecbf plymouth-system-theme-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 7a7fa056da7487b5446c9f88a64f965157abd878cded0ed4a94696be6e3e7921 plymouth-theme-charge-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 2c8ec041c6be8c4d9eafb91bc6af1a47ed2c1f7214e596706d64685d207d65cf plymouth-theme-fade-in-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 253f1970d218e45a30256c39e66bfec79f52ebead51d6be36fee930412012273 plymouth-theme-script-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 7cdef1d2c4a267599bfd955574a3a8c3c13f865612e7debdf95f86c9fe38d5bb plymouth-theme-solar-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 861415d5c28f0fccb910fe61395195ac10ef3b54b9b2b197aa6bd57b80b560f8 plymouth-theme-spinfinity-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 3b8bf865a3c420afea21ab3dfe201a42195b5c1973d541cee7f759f242143b4e plymouth-theme-spinner-0.9.4-11.20200615git1e36e30.el8.aarch64.rpm 6fb25bc306968d51d45bede63a39ac58107cba061a5bccda2042d07076aede50 RLBA-2022:1967 python-suds bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-suds. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-suds-0.7-0.11.94664ddd46a6.el8.noarch.rpm 25c5d401b6029f3e08e127a4ccbfb43d002b577f5240833c3f2a311cdc451e3a RLSA-2022:1759 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355) Security Fix(es): * QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748) * ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285) * ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286) * ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287) * ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289) * ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266) * ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267) * ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268) * ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269) * ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251) * ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252) * ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253) * ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254) * ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255) * ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256) * ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257) * ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258) * ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259) * ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260) * ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261) * ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262) * ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263) * libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485) * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) * nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716) * libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975) * QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) * QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355) Security Fix(es): * QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu (CVE-2021-3748) * ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records (CVE-2021-33285) * ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE-2021-33286) * ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes (CVE-2021-33287) * ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE-2021-33289) * ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE-2021-35266) * ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE-2021-35267) * ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode (CVE-2021-35268) * ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT (CVE-2021-35269) * ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() (CVE-2021-39251) * ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() (CVE-2021-39252) * ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() (CVE-2021-39253) * ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() (CVE-2021-39254) * ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute (CVE-2021-39255) * ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() (CVE-2021-39256) * ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap (CVE-2021-39257) * ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() (CVE-2021-39258) * ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length (CVE-2021-39259) * ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() (CVE-2021-39260) * ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() (CVE-2021-39261) * ntfs-3g: Out-of-bounds access in ntfs_decompress() (CVE-2021-39262) * ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute (CVE-2021-39263) * libnbd: nbdcopy: missing error handling may create corrupted destination image (CVE-2022-0485) * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) * nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS (CVE-2021-3716) * libvirt: segmentation fault during VM shutdown can lead to vdsm hang (CVE-2021-3975) * QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c (CVE-2021-4145) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) * QEMU: block: fdc: null pointer dereference may lead to guest crash (CVE-2021-20196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 54ac9d5ff7cfe04c8c978174304f3b769c6ebaffb5b4867452aaedb5bb405fe5 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 991c3ced4f9f62071fd55347b204cb02700ae6a92105be95b5cd7f8461084189 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.aarch64.rpm 9496f010dd51c309e35489e4b2b4eef9ca205efe10f699e727ebbb87f3216495 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 1d38a90c326e379f852440694d829d9df286e82f0aaaf7a20cf01a1dfd7253c2 libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm bc267e62ab3f58f101086759be4c2e23d04e1ad223dc3e5f9c3e612413663d4f libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm aa5c62e3fbf5ea23307d97e22527f643ceeb7a23ec6cffb8db277971bb87c570 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 857f74550b7100f3bbcb5838ebc3cb625b83804004286b1f4fd7c1b906d64b6f nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 7896e82315caee8ad9bd2644e530296ee622c2ddfae688248185723907e137a2 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 6f525884975cabd1580c6a8d697ccd8c045c659534a0c34c03968e9a21412908 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 8191bb3746b674453d36661d391b8c0e10a95f88c217921f9432d6b8a8bb6843 nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm f52b83ae63637c8b1e7315dfa0fe510aa51b78cc05ccd97b300434e0a28b0ea2 nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 1e49c7614560043aa959388f4518b2768e5425b8f9739ad1140006e3d655db8a nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 0aed2f62163a1ec150571397fd8d769bb51779ad3ef7fd52607a9757f0fd888d nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 766fceeadde01aee98d85e19c6277e616e069ace8b4c11779fdc56c79467bc2c nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 5b25ecac75ab91b2d379ded7bdbe88a94684e18f6061e7cfaed0ffb2946c6096 nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm ce3e3ee3844c0029598e80ba43fbe8f50c0cc992aec0e13d8c6637f171372f53 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d576ab4e2f4ffc7807d2cb0f6e2e25e87c236f476b1a78fa91a9e17f037da641 nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 452bfe16a3fa75235912bfa04b4f11556baee490f77e6321de7e153ac97a5fe8 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 94287915575db12bf71b263335af6131786ceb4b9b92e9c28fbbe8527c6946e6 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d16e4ac2b791ac7c9e318c529447913de8ca95449e1202c8cf32fcbc3cb397a0 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 916e69a5b2bcc4d8b0112922078774ffa5dfaf7f9973df775e1f5ef51b21b382 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 338678cc1b9159003aa7d2ea580f7d42e39a1e5ea2330a84878090fff1430425 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 3c0620998763169c5353c90923dda89dc3de31163c58f37c31baa00b2af81c22 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 39e68e387399720c563214f0b66f299572f479863300baf82e484bab46b46c9d perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.aarch64.rpm a142f30b346e5db77d4f5aa919920b3df24522a614c785efbc8a97df64ae5199 python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 3196143c842626a0a65c59ed1a7d1f7968fce62336a46d65ffaa996eaea74520 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 430e283968d39a981aac03c2c50e95f1adc9568bfed209ff0c948714a5a2710d ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 9779f9da2de53bef16886c338550c88e75f3ae8884abcb437e45472ff604ab92 RLSA-2022:1762 Important: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * podman: Default inheritable capabilities for linux container should be empty (CVE-2022-27649) * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) * buildah: Default inheritable capabilities for linux container should be empty (CVE-2022-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4395c56a677e11bf57b7c1627060cbeb814ae1dcf5948580ab371593f6494502 RLSA-2022:1763 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python39 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.aarch64.rpm 945155b2014169d41094e7435f5f87d32f1051e106387ca6cc8e793f5f4724cc python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.aarch64.rpm a1d3823b13a2340272701cc377c599dc99c444cfbc72ddaa59e8bb49a0be753a python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.aarch64.rpm 6c6625c6c95d89323390378eaf5350c35b9343b064ffee3bd6d6d5aab9bfe755 python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 0da717455ca0e38a885aa00a9f1ab095e43ad699c0999106516d7c0ee860f51a python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 1359c2457bcf3296afabfa4a3faf9c5852588cb881aca27112612f258f3c5119 python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm 5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019 python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.aarch64.rpm ba724bda5f89379dc12d94c50dd02ef0cc45d4a2657a311469101a57adbc9866 python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm dc96fad532dd6778a43cab79eca2e80d99d5c3daffd69ea743282f8f1a956422 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 518551ecb5bf3e32fbcf7dcc25feba54c738e86f77d84c1e50ff74e7f5f0f0b6 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 9dc218c0e4d7aa1754732b02593a0f0f727902dba3a3f0d93f95538c5c511ece python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.aarch64.rpm c107d9e7b25869b140877301ac6abefa2d4b9bac14a623975ca7aad2eaf7697f python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.aarch64.rpm b5b8a4573507189006d61b606f716c102e75ad51f13c9a830467cb6bd3f56151 python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLEA-2022:1767 nginx:1.20 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nginx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__nginx nginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 148d7f985f8035d6371df68e2b60cb7cc1970b62cefab117dbf25f91bb536816 nginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm 7086e83c8fa422089958552247e2ba103f5dc7c0ced95e75eec92411801fceed nginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpm fac39bbea57753abe2912b2ba86b7b230c90e2945572328bae797e0f1c95c4ab nginx-mod-devel-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm ea849dd171aeb6fc174102f4ac83a73309e75368537355b184fd803fc2f655d5 nginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm c6b61d5ba63f5e4aa64029d1ba043ab02a71b63be35e1c604228fcdb5da241d7 nginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm f63f391831126dbd3d0f53a7d8e4343688cee64219498ea7b4224f2df8d8e6f8 nginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 58d77e46f17c3b23230c6651218d3b16e2c8f84d587b4118c11d6952d10a7d75 nginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 6e92eb50e7682c9196fa34334b7f342802e75013cfd9fc153b11d3c0cf07ad46 nginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.aarch64.rpm 937c62b2d794de35e167b52a80a0af3728ee796f9ca37e3eda98241ac83f06be RLBA-2022:1769 libgit2-glib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2-glib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libgit2-glib-0.26.4-3.el8.aarch64.rpm 569ed83f98a12ff343e37889b533e2a67c298a19355dc5987241e86ab73e128a RLBA-2022:1779 usbguard bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usbguard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms usbguard-1.0.0-8.el8.aarch64.rpm 7fea58a9fc79aa2a1f1508db73034e39e3d6c53092a91b0c4bfec75454d84912 usbguard-dbus-1.0.0-8.el8.aarch64.rpm 8b1b3553b56461ab1b0256d33457bce0c84240add3425f0a1c4e8d0e6c98ed49 usbguard-notifier-1.0.0-8.el8.aarch64.rpm 58583214f1fef96522a8f1402c5661107318264bc2713d38fc7895e37ca73e6e usbguard-selinux-1.0.0-8.el8.noarch.rpm 529f010cb3eaff7413b133380a7f0e22e35ffd099e62dbc13b78c77df37d0bd2 usbguard-tools-1.0.0-8.el8.aarch64.rpm bfbfa0da6e12d30fe8f75748db30191e26198a5ce8c63cf63879d6a84b56e21b RLBA-2022:1788 jq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms jq-1.6-3.el8.aarch64.rpm e9a6ed8effdb306f24fc7f89791cdbef1a43f2069829514b1f2c0fa81ad2fcd3 RLBA-2022:1909 spice-vdagent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-vdagent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spice-vdagent-0.20.0-4.el8.aarch64.rpm ff8d0fd4992c8bc215d4f3c664b8d4c1d4092471ee51b058c74d8fe2dcdff9d2 RLSA-2022:1793 Moderate: container-tools:3.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * crun: Default inheritable capabilities for linux container should be empty (CVE-2022-27650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 crun-0.18-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 912586617853c37e9ddf8b951bd72f35172fe0452673b4a771ea9ab9cfde74c8 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c8bce58bb8faf13610b8212a0398a606c723903d32cdd511d125a492d5140f26 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.aarch64.rpm d265cd7a3d56fd2b95918ff1066f55d950833d6fbe7766873f7e4ead8d3b3fbd slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm a5b2c9bf2a92f9533b194472cf1d4a729879513b4796d3720b9ff97def54fec8 toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm ab2e6b9be7a0095f0c39f4b8da200833996f5c78628b8b7f3c3de1aeef9a6e37 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLSA-2022:1797 Moderate: compat-exiv2-026 security update Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for compat-exiv2-026. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms compat-exiv2-026-0.26-7.el8.aarch64.rpm 3699d7a13b6d9268e6aa3fd800bd87c58d1f5590ce3e68fe442c6a3b60f4d693 RLBA-2022:1802 gcc-toolset-11-elfutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-elfutils-0.185-5.el8.aarch64.rpm 8a06fcc4a29ba971d6c240b34ed8c2cea53cb182d8801ed6445c22a0e87e4078 gcc-toolset-11-elfutils-debuginfod-client-0.185-5.el8.aarch64.rpm b924c1e65036c44fa59129745fdfadde41edf89342e269f547befae02de92b1e gcc-toolset-11-elfutils-debuginfod-client-devel-0.185-5.el8.aarch64.rpm c6e00822613c55c881a7ea076be78e96ff5e62e7ab7aba53fdf378ddee507617 gcc-toolset-11-elfutils-devel-0.185-5.el8.aarch64.rpm c5d34232a61c927cb00dd2e8a4655aa1d20156144c65457f18a4229c50e58ecd gcc-toolset-11-elfutils-libelf-0.185-5.el8.aarch64.rpm 94853f129e59f2844bcd94110ea903db3d615a5b010a2e7b5331e65db5540331 gcc-toolset-11-elfutils-libelf-devel-0.185-5.el8.aarch64.rpm bd413be3ae4231e2a451da31fa55d5aaa6a324df70837ecbcbf20d43c789c56a gcc-toolset-11-elfutils-libs-0.185-5.el8.aarch64.rpm 6f4b1cd50476833349bc79749c9d13aafe6c124a63a945559497f53ee7eb0e1e RLSA-2022:1808 Moderate: aspell security update GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker. Security Fix(es): * aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for aspell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker. Security Fix(es): * aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms aspell-0.60.6.1-22.el8.aarch64.rpm 853dce875186fe2f7df29a39925f0a6b4dd9f594dc8e237e7bae4c415d5ae3b2 RLBA-2022:1809 tcsh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tcsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tcsh-6.20.00-15.el8.aarch64.rpm 3169650ec9e063ad150d0a6d69624d7822a8f6399f21638fd5c290350aacce3a RLBA-2022:1811 ypserv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ypserv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ypserv-4.1-1.el8.aarch64.rpm 956ab6eeab04d069d7666bd30bf4033fc49f872c32acc66a303f0a597828b113 RLBA-2022:1816 new module: container-tools:4.0 The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. This enhancement update adds the container-tools:4.0 module stream to Rocky Linux 8. For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4395c56a677e11bf57b7c1627060cbeb814ae1dcf5948580ab371593f6494502 RLSA-2022:1820 Low: udisks2 security and bug fix update The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for udisks2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libudisks2-2.9.0-9.el8.aarch64.rpm ff1f2339a9c5bd2481b730e75db84738a0569b8d784f0e470918f1411199c2b6 udisks2-2.9.0-9.el8.aarch64.rpm 86358fbed0a332a93116eb1916aa417e321c3bc66a2861aada39b74e6abd9d1d udisks2-iscsi-2.9.0-9.el8.aarch64.rpm e5cd3302dbf070bdcb5df744ebe718c835023ac68f4b1ea13b8647888ce116cb udisks2-lsm-2.9.0-9.el8.aarch64.rpm cd01b068d1e357c88617aa0ac8406b1b2e28959620f06b62213a19a79e7972ec udisks2-lvm2-2.9.0-9.el8.aarch64.rpm 9dc8445191f735eefa3591c2bff5ef44a8d0cb35b736e79cda6d767feb05aa0d RLSA-2022:1821 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python: ftplib should not use the host from the PASV response (CVE-2021-4189) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python: ftplib should not use the host from the PASV response (CVE-2021-4189) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python27 babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.aarch64.rpm 94a0af7667b29e361371ee000dac383c0357ad911906b27cb67fd8dcba2fd03b python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.aarch64.rpm 255b88b437db6964f802adbc8f340ecd759dd3f391e574915594a9272db5147d python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 8ccedb9b6934da4f44a44b8ed26c88a3b500efd518f2e23919955b3174b1c7bd python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 82618850ed681c3fb6f5b3c8911b7d924149cf73687bfc5a69ee9cfef1b3108f python2-pip-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm 424e634426f8d83d229c9960f37b448d1c68e8e656c8d820294ea9cf7262f368 python2-pip-wheel-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm edfdfe37a85d18af2192a371b7949e9dbb34e31f1acb4fde35483074d0e61e75 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.aarch64.rpm a09b0362a51a0d1e18fe75ed1833a38d34930603682d48fabe7df8d84216b822 python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b rocky-linux-8-aarch64-appstream-rpms__python36 python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 RLBA-2022:1824 gcc-toolset-11-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-annobin-annocheck-10.23-1.el8.aarch64.rpm aef2ec615cebad0b8c05921ca75a87f0b173b1720e26198a9b1482dd25beacde gcc-toolset-11-annobin-docs-10.23-1.el8.noarch.rpm 90db9c3ab986d12c8d5548d35741638e00d68e51b0c19fda613f4e44ab22b8ae gcc-toolset-11-annobin-plugin-gcc-10.23-1.el8.aarch64.rpm da6ef4226c40c6dbc36d2859abe196338cdf1c913aa7cfaf6330687ac1093f8e RLBA-2022:1825 python-resolvelib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-resolvelib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python38-resolvelib-0.5.4-5.el8.noarch.rpm 4df9a9ad94a685368c3a54f945f5b64477f08a45b1e83718cd66fa092e527750 RLBA-2022:1826 sshpass bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sshpass. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sshpass-1.09-4.el8.aarch64.rpm 0f093b5c0f283c34e982e3dea9a1bc79f6e7d8872e8c0e3d1545b2e90643ad31 RLBA-2022:1831 postgresql:12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.aarch64.rpm df1a17426addbb4733fd9fab1f0fbbd4dd3f54ef0a1682538a6dd9d8d73d2b4f pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLBA-2022:1832 postgresql:13 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.aarch64.rpm f7bcd5a0f6740a069d1c012096b3edf2721720788607baf4ac42ac5e6d53995d pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLBA-2022:1833 inkscape:0.92.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-scour, inkscape. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__inkscape inkscape-0.92.3-16.module+el8.6.0+805+841d2db4.aarch64.rpm b13873fb863f180f75decd8d47cd8fb8871c878e14096aa17b6371888f2e3651 inkscape-docs-0.92.3-16.module+el8.6.0+805+841d2db4.aarch64.rpm 77c5e28883d2f64c0942d27eb3642280b579e9abdc8ffc5cef46d430c1598b57 inkscape-view-0.92.3-16.module+el8.6.0+805+841d2db4.aarch64.rpm 1853a1baa6c168f6e6090d02686ae67c739844088265191b725dd5b396788e4a python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm 2d98828c4be992dec68f6504a352e553bd115d99c99bbeaaa08de384918910d1 RLBA-2022:1840 gcc-toolset-10-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-10-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-10-annobin-9.29-2.el8.3.aarch64.rpm 55f7d2b2c14cc6e518e6c1256f607b577785fa7eba32de456c69ae288fa70674 RLSA-2022:1851 Moderate: pki-core:10.6 security and bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tomcatjss, jss, pki-core, ldapjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * JSS: memory leak in TLS connection leads to OOM (CVE-2021-4213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__pki-core ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f tomcatjss-7.7.1-1.module+el8.6.0+788+76246f77.noarch.rpm 086e5c953de53c42f6ae4abcd32e4c9126ba1dd9a028a7a2624a7d8bff1fa27b RLBA-2022:1852 fido-device-onboard bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fdo-admin-cli-0.4.5-1.el8.aarch64.rpm 64ac8be03ec5919ef62b5f4ae0ba230ea3ee4f21349a7b9e3f1f1378dcca30fa fdo-client-0.4.5-1.el8.aarch64.rpm 3c370fbfa7b221dab3a3abf0ae1e8b994978c78a6a0ae87300d3d7c147c226fc fdo-init-0.4.5-1.el8.aarch64.rpm 330d9d8e2d278bb6374a647ec5287644f5d1ac0b75e89ef51a3162ccdf9d047a fdo-manufacturing-server-0.4.5-1.el8.aarch64.rpm a26d352b1eb75aed8eda6d1c84e37bc588d0e1a684502fd5e52cf28e2f9b4b07 fdo-owner-cli-0.4.5-1.el8.aarch64.rpm 262ae854bdaff494bb2f1366edd2638b9a43ca06396d5658a9d7942670897863 fdo-owner-onboarding-server-0.4.5-1.el8.aarch64.rpm d21bcbee8566d95c294e952cb7a3af123c3aba3411799ee839b2ca477dd6515b fdo-rendezvous-server-0.4.5-1.el8.aarch64.rpm 57bfe0fa3b40e91e979a8467cb01306736c26c5e2319037c510bf31cdae8002f RLSA-2022:1860 Moderate: maven:3.6 security and enhancement update Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-client-4.5.10-4.module+el8.6.0+844+4401f2ed.noarch.rpm 2a57d054836c857182ff749dc7be558ee1a5f07b00522cae3cf3f3d87c914217 httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 02dcbeb9256307b3d4e05b330cc1b19315500c03a4309b032db1a7ee3f4b5407 maven-lib-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm ece3ed809322707652d98d21a587efcda7cd2dd195adc5eac9000510ad645087 maven-openjdk11-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 312291f926d1ff4969ce01835823bbe596fa6eeb2f9d678e4855fdb051961d30 maven-openjdk17-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 41a59d80aa9b8b60c4c5e2daba8b2ebcc4ae6d33583379342ff21d924a0cfd88 maven-openjdk8-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 93eeecde30df6567f71618ed96f9bda171f5a55ef954dd6506b467615e462913 maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLSA-2022:1861 Moderate: maven:3.5 security update Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__maven aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpm 645e5fcc65f5ce6a5e7c644af9aab686e5168eb67dfd41299b949b73980385fe apache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpm 9cf097d54e58ae1b8fd93d9b45f21f4af852b93f03e628386bcd0c88fc09745b apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpm 605d7fd276cc1605f057689518327458da2d3e3bbc9ca913a6c22523af7e05f7 apache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpm c150457c26d08f11ab2742a26b5603ac0421309db274d1fb9291609513952291 apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpm 0bec3fe86916400b445c090e2ac59fa15e67b85634d5d19db6be1bcfa35f53cc apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpm d1ce83ba6cb3e4a97216feb51b8f37d3bbd6d163343165ff58cc15cb5340f14a atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpm 860817f72225f53de2c34d05aec257a5d30619b2a66ac51d3e72c64b362a950b cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm e8d491fba0eb58a0c39d874c349f74791897d4081e994974882c75018a06fdb3 geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm 2816206b8a4525c74be3dd28945359d43c37633863851e98787e4c7785c009fc glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpm 17afe1f510bcc20dd864bd1d4ce9ef4ba137175ba3c1741f9006e00dbd48ec24 google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpm c8b1e0ebe1f806d22ee98e61211e3765171361d54c8aa43d237c47756d4413f3 guava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm e3dbd918aa5734109e5025fcff46aa6cd3a7d681c15b47b3839ccd014318b579 hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpm f9013313a092e35684dbfa9b11557e1603fe59feaa126da2cf2915c103413541 httpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm 7c7e53a1beada7fd2cfdae8f50acedd99d62bb3f92ee4cce8c7e8bd8e1e9f520 httpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm 6254441dd7d139fca7bf71c3efd602ae15c8d4ca4c448d26de3807a94f2250cd jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.aarch64.rpm 5a7d8eb4d5ca317607691a7bb2c1cd86e8c42fc7c95f8af798b4698ab8648c9d jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm 493532237bdca6b7839c897c1a96cdbe6f954348baf86f9e61abaab5b1ce1b07 jcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm ec223715ffea5512ef05f8360522ec30d7052669260bb9c86ae92f6710aa4168 jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm d53adb7c5604a6c4b463fd8356426c62a0e287bbc2cfbae244eb30eb68ed108c maven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 8d0715634168a0feead5c2200b92f87700932e0482c656fd6d46804779e1cbf3 maven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 53d03a2e69c1418fda008f86abe12366522fc7db4a6460e02364f332f8aa78d5 maven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 15ca161ef8ce0b64553cc1e9a6c08c7c52233756722ab7b02b71443b22d76bb5 maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 183df0d4f71c063a2120049da9cf587068a3c4afd57f31edbdab23d2cd42f87b maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 72909fd412a649f39c80a3aeac0785ba97622f59d0c490f5784bea61d6f9f22e maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 890e312f32d987ad806ead574436896a3fdb69cc4c701d10a8a5cdeed4f335f0 maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm d62eccdd6992ca5b358305ab16e27b68f98b9cf3b8b3d31b860dc1afe772d4c0 maven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm fe818f18b5bbfea7d1d477e35e8207ec850c4303dc4bdfd97f1c4fd5a788107c maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 0348dc46c7235cbdb54e577a5c7e3bf67bf3990c5b5224da5a8dd810581b0aa9 maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 4c51162d25acfb25c357e2b78536d0439b499a894e89bd888970ae2ae7952e6b maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 7c235cf78744f6520a54c1ec8eea4e9f8adeb990d58958f07f1ffa16951fed0e maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 97503c4b45752870defade5f80b65af78a64e63bdb7ec31c7131f9478aaedb0e plexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm 92f2c95dd389e6f28bdb5336069b9843e2d77e93561cd94114e795b648669963 plexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm 86ef908e4b8b5f6b75d79fb71c9e941d77070240f9f520da09a8f02f76d68c55 plexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm 4df6c9152b37c8c6f3242626c80b8138dbc2dcc2c16e362e6b7f9bd5fc011e1d plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpm ea5b1b2a881c5ae1c82442c1642dbd21de75bf72f84186f1a04e06af74491791 plexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpm 3b64df7a26462444ef46b693adf0d9d4aa4022a17cacc936d2a76fed0c9466b4 plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpm bd6542f8ea1aa47b0b5b280828f4828dada693a8ecfe1e9eb55a1ebc300f75ad sisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a417c7920d1c835b4342cf7f278800e79764ca5337c6d42e25e06f4484e6c98a sisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a3be327bd921aab3011f3e1aa3639e45ef82c9fe97e29416851ef69300d9f4c4 rocky-linux-8-aarch64-appstream-rpms__scala jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm 71f32b6fe08073c78cb2584b57563d05c063c8dfc6a71be37f424c67daf95938 rocky-linux-8-aarch64-appstream-rpms__pki-deps slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a RLBA-2022:1862 virt-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms virt-install-3.2.0-4.el8.noarch.rpm f13631961b3c5f73652822b4766f9a1a61269dde8dbcfd304d6eec53282e32d5 virt-manager-3.2.0-4.el8.noarch.rpm 3c45b10c17c93a29e393d7849163945f71fa32d43d91fbacfbb8b509eba94b56 virt-manager-common-3.2.0-4.el8.noarch.rpm fe1626498e6043d89d32a967eb9edeadc6211a8ca1104b74b6d7044b7ba276f1 RLBA-2022:1875 adwaita-icon-theme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adwaita-icon-theme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms adwaita-cursor-theme-3.28.0-3.el8.noarch.rpm 3b35985ea1acf4036276f55b8831b41875279082a9c57232a1c028a5399bb65b adwaita-icon-theme-3.28.0-3.el8.noarch.rpm 2407bf478cec673be1f78f6b7ac92e18b8e5929992534578ffde85cff251c0d1 RLBA-2022:1878 git bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for git. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms perl-Git-2.31.1-2.el8.noarch.rpm d02463730699f65617a1c3fe4a29b8d955c9f337547fd79410b59de2096573da git-2.31.1-2.el8.aarch64.rpm 16b1b4746d1acb39881bb5bd942c805fdd5bd1a95ffe60a059c0932a5f1ce429 git-all-2.31.1-2.el8.noarch.rpm 36e84d25fa924b9d8e897cf4926c20698f1324425ac5c9f93a4290bffd915509 git-core-2.31.1-2.el8.aarch64.rpm 167e54a9472d61aceef86e856717037d6ffae8874e1cfd1b240e0e45d5219d9f git-core-doc-2.31.1-2.el8.noarch.rpm 024495aaaac25b8159877171d753e6ac24bd41677249cfc065792e76bc615b3a git-credential-libsecret-2.31.1-2.el8.aarch64.rpm 03c0d348e01a13a929a223c3229bd9cd41a42595879403d7b237dd68d6cb0c76 git-daemon-2.31.1-2.el8.aarch64.rpm f6fe8336d144e639a40a4608d25fbec9ec4b4b663bafda5e6d8370fb9b2b8677 git-email-2.31.1-2.el8.noarch.rpm dc4c21ad86d01eaba0813ab4eab28183006b7bd1a7666deae56f472075bb564a git-gui-2.31.1-2.el8.noarch.rpm 9fbac33ada979bb1086a94c50e98c060aadd9f598d5c1318585c0986ca657722 git-instaweb-2.31.1-2.el8.noarch.rpm 9f2fd320848f12dc5632030eb9336d6ac25f17578ca7d1146e858f1ab53c2e44 gitk-2.31.1-2.el8.noarch.rpm 003c3d1dc4c018b3784a5b55a3f3d23d29aff2b3812829e221bc04c6b1187423 git-subtree-2.31.1-2.el8.aarch64.rpm cae5a369ce56d49767277907d8fd32819fad5d7bcc15f21f82bfd461962c3879 git-svn-2.31.1-2.el8.noarch.rpm 1897ac4e96bfbd05d750f8e4a0eaeec8b390d60afa193a7f6796168e55f55925 gitweb-2.31.1-2.el8.noarch.rpm ea8caa52549a785a1773f3f4ee8666a8e12bfc8aecef4880870b2a5c74f35ae8 perl-Git-SVN-2.31.1-2.el8.noarch.rpm 88cb54d628e7da095c2deb6e20c955c04760f5c4686d29013d3481590c9f69ae RLEA-2022:1884 idm:client and idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLBA-2022:1889 texlive bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texlive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms texlive-environ-20180414-25.el8.noarch.rpm 1164632e4d523dab808654e313fb853a6bd4cc22eabe3c147fe1f7e8483f7c78 texlive-euler-20180414-25.el8.noarch.rpm 7debf8882af04eaa062a640c26431715c3402afa6cd2a3696741566cb92833bd texlive-filehook-20180414-25.el8.noarch.rpm f763b1e0291ecd5f46b924540a3a013677b1fb1e0ef7d36a0b84c98b26145235 texlive-20180414-25.el8.aarch64.rpm e49fc9a341d11e68cc1ef56f14c8d6168c8fa3cd805a0f071d642dbcb293fa43 texlive-adjustbox-20180414-25.el8.noarch.rpm ae011dbe779b1df6055cdab83865e184cc8089e032644328b9175639dc59bb06 texlive-ae-20180414-25.el8.noarch.rpm 6e905e809230887b6e8a386d236cefd199954b85130b67df7e29624c6bf4cd3f texlive-algorithms-20180414-25.el8.noarch.rpm c81d5a614e695afd20dce5f749a93a160af06df2d20bcabe526d94922aec4eeb texlive-amscls-20180414-25.el8.noarch.rpm 459892f2e8fcae0bbb0c38dacb89fb6a50997b2f1abe759b38176ed06874e8bb texlive-amsfonts-20180414-25.el8.noarch.rpm 4b4b2242dca9f44a353f737d2f8bb69356b61636fb55d953f1353b1d89a354b0 texlive-amsmath-20180414-25.el8.noarch.rpm a0dfe125feb0bdbb737be04b7305f3a6d877b833bbcfd73616499bc4811d5c0d texlive-anyfontsize-20180414-25.el8.noarch.rpm efb7ad5e995bf24e6ffacc959b368b02105a6bf1e1645bbd2111a7764420e59c texlive-anysize-20180414-25.el8.noarch.rpm e61521fa3902da550dcf3ca9da3616540ed70e67164417aea3df39683faf7041 texlive-appendix-20180414-25.el8.noarch.rpm 3b375df089e9b2d69c6a758f40dc823c708fefd421c34f11bacf942d2b3d7c26 texlive-arabxetex-20180414-25.el8.noarch.rpm cae22672b1f4b213a96ae7f1cf2c5a90d87b236a5968fe7de44efce761ab833a texlive-arphic-20180414-25.el8.noarch.rpm 5f822437b7c934964f4f8caa1946ad8a9cab7181883dfaa295ad5268215bc994 texlive-attachfile-20180414-25.el8.noarch.rpm e3b88649b6fced18a214ddff57cca1c233065f73459c672ae1d49497cf045293 texlive-avantgar-20180414-25.el8.noarch.rpm 0e8432d82862698c0b4691e52bbdcc4322f8872755f498c7936c8e7a6bdd5ffb texlive-awesomebox-20180414-25.el8.noarch.rpm da55567dd39f004d50c1e9db3c8dd3e22b51930fce30a69b8711e3ef9c79999f texlive-babel-20180414-25.el8.noarch.rpm ff9bb0ff7b5a44b45b1c885545007f9cab5b740e1a3917c36ad5c899300afda1 texlive-babelbib-20180414-25.el8.noarch.rpm 55a073dcfd46e532abf6ee7d19e258c3b90a4250b7c1fd30d6370c87099e16e0 texlive-babel-english-20180414-25.el8.noarch.rpm e4e11539cfc94f7a0ca43889aa742f00ba377a868595fcdc8e9e79d321132e1a texlive-base-20180414-25.el8.noarch.rpm e90446c9541d26677b9cab779a760936bc145bb329a5d790ae04ada98ed7c108 texlive-beamer-20180414-25.el8.noarch.rpm 86d6b74d07086b52218478525d8c2a8ff4283ce7bf44f1cb2c0daa0e0fc855c0 texlive-bera-20180414-25.el8.noarch.rpm f6b4920563d8b27c1019e09b81702d6671f6d87fcdd35c6bab46b192b3ab7cf4 texlive-beton-20180414-25.el8.noarch.rpm 3c3a701e1c7ba76a69230862aa4dd4f1b157993470f0306bfdb226308b98abe2 texlive-bibtex-20180414-25.el8.aarch64.rpm ad24d890cc302f3c4e976ad6e673f8dd403d07c073a4bb5f5151df00111ba215 texlive-bibtopic-20180414-25.el8.noarch.rpm 3194ab38bb507f8f0f83fd0c4d9c8457b079ff66d125e646bf15ea8008184d39 texlive-bidi-20180414-25.el8.noarch.rpm 1f4406f8737ecd3736e263ed6a97f86614bee54b2af4c9b97840a5a62000b5a7 texlive-bigfoot-20180414-25.el8.noarch.rpm 82d718d89b8c87d52ae9ed5b7705ff8e6bef10c0704b065a0e7b6967cd0af0dd texlive-bookman-20180414-25.el8.noarch.rpm a6cb6fc191d4a31d2c9a0b1ced169213285be962da174452bea381e761b2ac8d texlive-booktabs-20180414-25.el8.noarch.rpm 900f16491c97dd2e51c12b81a5d51191cf9d9825f97caea3c2566ed16bdfd681 texlive-breakurl-20180414-25.el8.noarch.rpm 3a251185fefb2b2bf51091af53c906d2eabecbfcd4eea089ac4459f39417db71 texlive-breqn-20180414-25.el8.noarch.rpm dae4180acf480d03ef60d1269e082ae5f69273c2fba1640bb0f94f51b98c3aa1 texlive-caption-20180414-25.el8.noarch.rpm 7bf93d6bda158f65fe084932de344e9c3433f2a020ded7f7f7acd209c3144550 texlive-capt-of-20180414-25.el8.noarch.rpm 24361f4b10f87d6c8267db8bcb9446278b5bb2c5277ddc542e0fae50cf9358f2 texlive-carlisle-20180414-25.el8.noarch.rpm 266b87404829d306207eb9386329de828ef9dfc9af16969c2d159103a1f87e88 texlive-changebar-20180414-25.el8.noarch.rpm 87b878b073a441e6722a43bf193690b8eb1c510a37a4d37b1063287bc7fb6e08 texlive-changepage-20180414-25.el8.noarch.rpm 2e997c9da065f25ce03ce67c73046c6a16c90dff6d8c350e782418adae92edc1 texlive-charter-20180414-25.el8.noarch.rpm 93266dfa283a03bf209f11f507120e04164e438ab4277da31ca1ffab8b1c76c2 texlive-chngcntr-20180414-25.el8.noarch.rpm c4e2f54d1789524f4dc8b272fe1898a779f476b1cd91146cddbc237ab0b2dd57 texlive-cite-20180414-25.el8.noarch.rpm 3db3c0889178adcf8a4ddc6546d8bd07251107da16dc9bc9886b87b848a9a369 texlive-cjk-20180414-25.el8.noarch.rpm b054038461079165797e8f3dcb6cf1b17dc2443a157f203dd0c244f7186d3910 texlive-classpack-20180414-25.el8.noarch.rpm cb6380339c7ca5da8393bee14d5e4b7b62155028894540dde1c493f3382b250b texlive-cm-20180414-25.el8.noarch.rpm 4b712b128fcc2acdd7168f06e6c492374130d4292969181bf3b2475ebfc4a5c2 texlive-cmap-20180414-25.el8.noarch.rpm 12e3a3b8b6285826d8887c1c8e315560bb309f9e73e75eab5d327938c1734b3f texlive-cmextra-20180414-25.el8.noarch.rpm dc9ac4bb7f56d8aad81cd70a3b362ab8d37106ecc43c4ce34718b0e9daabc4a5 texlive-cm-lgc-20180414-25.el8.noarch.rpm b0af107974000979206fce50893ffb061f1ad1f41babead50f6ff3e347138e37 texlive-cm-super-20180414-25.el8.noarch.rpm bc6f15eea9a0ec65807187f86350ad449af5867267b72863d30311ba791c6235 texlive-cns-20180414-25.el8.noarch.rpm 4fc21e45aa490b5a0015ed16999f53cbb46bcc6729e0541426899ff749e8a5a2 texlive-collectbox-20180414-25.el8.noarch.rpm 993fc97131f9865611062c7535e7beb09a82a2eb07010abc2f27891c2bbc18a4 texlive-collection-basic-20180414-25.el8.noarch.rpm e08e24cf5584c7da4a94225b86e30a3f2aaa64d58d2478c712d4358ccf54eba7 texlive-collection-fontsrecommended-20180414-25.el8.noarch.rpm ef06315141a8efb0b705e2cc421b0afed7d55c16ad6c48839392902914516b0d texlive-collection-htmlxml-20180414-25.el8.noarch.rpm f0479643b7c0e4c288896bd0f278236ee02c05254b3340c4f86faf6ec3a37201 texlive-collection-latex-20180414-25.el8.noarch.rpm 8493c67d76b032bc3b47ab0313ac460b5fb562724c086be76c6d118796af8cf9 texlive-collection-latexrecommended-20180414-25.el8.noarch.rpm 43a8048769f9a6d4c1c48571a3b0e75e9171725a63c01c1ecdd7f2b462731ce6 texlive-collection-xetex-20180414-25.el8.noarch.rpm b59b51113f2410358f99ecb36bba67cbf3bca777040d5649271a5189d4a03fe6 texlive-colortbl-20180414-25.el8.noarch.rpm 4b5e74f283d3c7e9df6d372370615cd50422b4103a446b5fcf85dcbe22112563 texlive-context-20180414-25.el8.noarch.rpm 74d2591b8fcd7ae0f541b37b7c607e848e474b3bb656410ebced1b9874272c63 texlive-courier-20180414-25.el8.noarch.rpm 4074f2a3b7af9e49d32f073e73c87d7291e82ba81fef5e471e7f4d1305416a5c texlive-crop-20180414-25.el8.noarch.rpm 2227ff46fd6e8c789105c31ac9c5fd8074d88a90c4fc6f9b9c5daf2203dadefe texlive-csquotes-20180414-25.el8.noarch.rpm 5072af2122eca21cff7b669d07d2fdb349ebb63a3f17ceb73da526699284c51a texlive-ctable-20180414-25.el8.noarch.rpm d6fd80302edb02073fc18038a36271238ef379a413ac263f6f53ac9e13cff978 texlive-ctablestack-20180414-25.el8.noarch.rpm 6d0e40dcdb9e44e75e414277dd97b341b675520ec04aeec9baeb5a7f113dcd9f texlive-currfile-20180414-25.el8.noarch.rpm 60814c1dd8bb5fa40a1854e98459f309197b9941ab0cae6d1f2abf23217e171e texlive-datetime-20180414-25.el8.noarch.rpm 167bb4b0dc2f6789ed2a002fa0119c6f2565d7aa059eaf3df48095c311e2ae31 texlive-dvipdfmx-20180414-25.el8.aarch64.rpm ff9cdd2d2a671a6e3b9fa4fa0ade8348cf0e4eedc70dc5a644828d728a9cac67 texlive-dvipng-20180414-25.el8.aarch64.rpm f25204343ddc5bb82f634e4a73082499637eaa7c8cfd002799cafa43d97d6617 texlive-dvips-20180414-25.el8.aarch64.rpm cdb65217d5c4594f4f309a45f1f0306be8dc81a41c6eb819294578fe369fca9d texlive-dvisvgm-20180414-25.el8.aarch64.rpm a3c0e32f1fa8092a56c97dd6266db739a93d148242fe795ba78c10103ca160a5 texlive-ec-20180414-25.el8.noarch.rpm 1fc6a8529a3d44c4431f170912594a0fb18f960310a9f2ef0167aeabe4c90d73 texlive-eepic-20180414-25.el8.noarch.rpm 3f0a81a13f4a525849d444ac3cddcb42ad4b2fc16703be7dc34262c1559c0259 texlive-enctex-20180414-25.el8.noarch.rpm 5f961e5f85fddcdba82eef0d582c0caf0df50205f75c341862668a82bb231538 texlive-enumitem-20180414-25.el8.noarch.rpm fa0af899af69457ebcee4541f9646ffc239f30d764731e6774c343a08a9e3c77 texlive-epsf-20180414-25.el8.noarch.rpm 39d0a343cebb1ccdae1af654e3cd356b1731e11760a621b27c5573d62f4640f7 texlive-epstopdf-20180414-25.el8.noarch.rpm 59822cee9df3a444922eccd1b88eae4d487097eb1da976a94d5aeff93bb1213f texlive-eqparbox-20180414-25.el8.noarch.rpm 30397f4d32e42a90b029d495274efef400961e7e8a6cd2b8a9efb38dc9934214 texlive-eso-pic-20180414-25.el8.noarch.rpm 886c72b65ac519271f61210102bfb6c0b05e4110e12a24204016de4bd6e90ca4 texlive-etex-20180414-25.el8.noarch.rpm fe6f963e4799e0efc8452e0f26ac3222ce49785cab6a55d201b6279737f7bd84 texlive-etex-pkg-20180414-25.el8.noarch.rpm 9ce0887cf15faa6571b99bd6e99af573f208087aa8f669cc670a28b513398142 texlive-etoolbox-20180414-25.el8.noarch.rpm d078d77a5cf5f14a3f4bc0a9bf13bcbc7403087753ebfb1730dbfcb59c41c309 texlive-euenc-20180414-25.el8.noarch.rpm 3268a48e7348838de68bc37fa2cab0225da3739f1591d3044cbfb55f6e2dcc8a texlive-euro-20180414-25.el8.noarch.rpm 7a32ca4e50a81cfb339c4e49c47e2dd056fef71ae8198ab74e4d554511e5d7dc texlive-eurosym-20180414-25.el8.noarch.rpm 1ea6df9016691a1668b2959cfc887597158c0c5c26943780a8f8abd3f35ec498 texlive-extsizes-20180414-25.el8.noarch.rpm 25165ace726d47f37be296fa366602ed45a8a04aae4aa73f3bf7a2e2b8d09545 texlive-fancybox-20180414-25.el8.noarch.rpm db00055abda0a1ae077985d08482bc80f820b1f001da99a1d5363e038adce7af texlive-fancyhdr-20180414-25.el8.noarch.rpm 38f5bd06ba84baeb43fa5fc325cb452f438850be0dd8eb773149a41c07994d09 texlive-fancyref-20180414-25.el8.noarch.rpm 9d074e5f81a09540131b3420e58ed15f8a4ce330d9942e4bc17bbb743f671257 texlive-fancyvrb-20180414-25.el8.noarch.rpm 3915a5acfebaf64925d0ea7dbd8e14a45ab89e323d0dbd573eb49523c2e2363a texlive-filecontents-20180414-25.el8.noarch.rpm 7a16731f199bc304ea78f32b034e7bc05d6dd8e21f7861a95deab957d3373ac6 texlive-finstrut-20180414-25.el8.noarch.rpm 2b18cbe5906e25e0820e3b819c23995e16419bba767098f8672bf58d03421a09 texlive-fix2col-20180414-25.el8.noarch.rpm 3daf468c40068993e8886fe55b8ee21ef7dd9250085d967555e53cc5f49fcdc7 texlive-fixlatvian-20180414-25.el8.noarch.rpm 4ecbefaaab8a9eca42750a092273a873a4989f84ab67f9eae2e4ea1eb9989dc2 texlive-float-20180414-25.el8.noarch.rpm 49610b8dfbfafe0d87697dcfc1e88b430e78c60d4581fb7f9568d2cd2ed451e1 texlive-fmtcount-20180414-25.el8.noarch.rpm df8c2b157228d6b918c3ee7624cbcb78550702f73f20b04ba0444983e540d5aa texlive-fncychap-20180414-25.el8.noarch.rpm d4cd132c053cbace5917d0a9107f7977c4878462da62bebe8fa8cd8e4a881c6d texlive-fontawesome-20180414-25.el8.noarch.rpm 878f40541575a61af8429165e2ba391625089149bd4bd737ee0801c4b86f1657 texlive-fontbook-20180414-25.el8.noarch.rpm e09f9b8cd44049009e717e6e47f58cddca43e695ec428879ff408fdea38ff89a texlive-fontspec-20180414-25.el8.noarch.rpm f1082b86789497fcdf53485e887248b340eb719806736c3fdde83cdbc815c6ef texlive-fonts-tlwg-20180414-25.el8.noarch.rpm cb91e013b0a462a59a9ecea7d7a76aaf333619930e8981b47d1788d8b193a987 texlive-fontware-20180414-25.el8.aarch64.rpm 67e24d50ff6d39a1934113ae5d2c540f0faf1256f36c8b5ed10be8628e249cb5 texlive-fontwrap-20180414-25.el8.noarch.rpm 642fe8615e66507fc0126d985e15adab7673130f6cdc8a927db39dcd23ede3ef texlive-footmisc-20180414-25.el8.noarch.rpm 60613537d74909dbbc964a420e2537fb07e59cb06fe414087180d3976f6e35bc texlive-fp-20180414-25.el8.noarch.rpm d82ce702a5229c56f009896944066a0552d99b452b8b46046511dac2b6f0251e texlive-fpl-20180414-25.el8.noarch.rpm 7102affb1c85762dc6280bdcdc662ae6745d5db2714c33db3b27982e29faeb49 texlive-framed-20180414-25.el8.noarch.rpm b79dec5f59d7f096916642b2bc079e860911350e75b8700169f578cae59ea298 texlive-garuda-c90-20180414-25.el8.noarch.rpm 8efb8844b4b4ec2d0cfd873bae2d6aac64d828a14ddca1efd899c911408170ae texlive-geometry-20180414-25.el8.noarch.rpm f798179b77880d4550b3db5e80bcec0086cad1f6ce6512946dee62fb88aa62df texlive-glyphlist-20180414-25.el8.noarch.rpm 2b043f1d6d903eab9212a25e3852c19161bf418e6a5b646d2a1474d73644400b texlive-graphics-20180414-25.el8.noarch.rpm 743f0bf90a63e1ae922b0994e44105738cbef59f718710efb0a4d607fc5cd98c texlive-graphics-cfg-20180414-25.el8.noarch.rpm a3ab6698567ff1db3db332367f5f4e780e216cab72460f77525c98095eb0a58a texlive-graphics-def-20180414-25.el8.noarch.rpm 1ad672b18c80324c6aaf8ffb0d747dc998192157a36d7c31780ed39a2507808a texlive-gsftopk-20180414-25.el8.aarch64.rpm b3bf5cd38f1f9ad065291cd57332ac3a27d864a1a5f81fe452273327b374a75e texlive-helvetic-20180414-25.el8.noarch.rpm 00cedc721b33f6a2cafbd6a9eb4d027d07bd4789c8ff12e6973657761fa5d400 texlive-hyperref-20180414-25.el8.noarch.rpm 44128eaa6d5687f7df3b95a6566d8cc4356cd4fb0ca5ec7f0dcc6c32ec219f35 texlive-hyphenat-20180414-25.el8.noarch.rpm 0f4da6a18bbffe186329b71d51d0fcdcd1438536e415668e8f3c34156ae06e53 texlive-hyphen-base-20180414-25.el8.noarch.rpm 621258b17f1fb7fb747a9512c434bbb1acf54b4dca8936c89beeec1b42ffea9f texlive-hyph-utf8-20180414-25.el8.noarch.rpm 2dc38e1131fd329015d453e3d3833c94ac9eaf9b627c68eb19ea337963ccb334 texlive-ifetex-20180414-25.el8.noarch.rpm c0ff6d5dd4e66b3c740e6473b4509af77042180a855268beaa5535c2e2a557b2 texlive-ifluatex-20180414-25.el8.noarch.rpm 3c9555dd232f77eea0643e7a485050ee8eca04469ad313803a4b30bd3a735a0e texlive-ifmtarg-20180414-25.el8.noarch.rpm 6292141c20ace8f90a49d199a35d9a7936bedf8df2fa1209f3d16b0f4f8a063e texlive-ifoddpage-20180414-25.el8.noarch.rpm 8b918dfbbb271bcfdef1f24b53c431cfb407fd84c756afac622ef3572fe235c3 texlive-iftex-20180414-25.el8.noarch.rpm 2a18f6eb33816a826fef8e524f2c38470c796e18329ce9cc8cf6b62b2554d7df texlive-ifxetex-20180414-25.el8.noarch.rpm de25e4ef32f789e48e79697ae7382fb64905abddb37b3b29b1d7d4973fc952eb texlive-import-20180414-25.el8.noarch.rpm a7b0e363a79aa8d3df466f9231f082c0a316e622c9994ec91741f2cb2d7fae16 texlive-index-20180414-25.el8.noarch.rpm e47a93db86acf644e7362e1fe17cd74f50b19788699db29d2fc73f29940e19a6 texlive-jadetex-20180414-25.el8.noarch.rpm 881f96fc1c0095fa5ad9741906ccd1f92772a594e129d89126e0b733e6083aea texlive-jknapltx-20180414-25.el8.noarch.rpm 9c4877ea7334a875f599e8207a03e05777246fecd2044abb436159c4c1acbe46 texlive-kastrup-20180414-25.el8.noarch.rpm 4b93c2acbd83bab1e66a3adb683f268158b0c43f6a602a2ba93d2c61c3318247 texlive-kerkis-20180414-25.el8.noarch.rpm 9ef7cf3bc6b2c3b8271a7df9b5868edb31e54bd2ac2c48ac67636a9512e56e48 texlive-knuth-lib-20180414-25.el8.noarch.rpm e69d83493a3da333753165398c2e6ba681095441315110f452cf7109b63d8ed8 texlive-knuth-local-20180414-25.el8.noarch.rpm 406722c988dc743597782e5632690ca0ed2c5cc5b602ce93bf983ef4eb83dae7 texlive-koma-script-20180414-25.el8.noarch.rpm e918c4fe6aee479325e200711a357ffdc37ae2bd1ff7851b6fcec01e95538a6f texlive-kpathsea-20180414-25.el8.aarch64.rpm 3a0803e46309ba0cba211636c59bf45ca09ba0605f1a02c3fb1e4c0ba0503d0c texlive-l3experimental-20180414-25.el8.noarch.rpm 02628a3e06ec9d780fe419eb50a227dc9103de88b3c040ca79eca15dc05b06a5 texlive-l3kernel-20180414-25.el8.noarch.rpm 63f5f3c3823e15bb2e67d26456c4c067dfc6f37449269fc8997bfcca597a19cc texlive-l3packages-20180414-25.el8.noarch.rpm 203456b816a7a7b836f5f556090c7b465568d7c208e954eb4a419a40b57b2b30 texlive-lastpage-20180414-25.el8.noarch.rpm 20c6981bfa9f31088ada533b2f8852b7c43bd807b819cae469503b5b425c9a2d texlive-latex-20180414-25.el8.noarch.rpm bfcf8d50ba4036104454a5f7d306168f3175135db7ede24c985a875367565a9f texlive-latex2man-20180414-25.el8.noarch.rpm 4c24c4fa7ba221fd71debc326b91948d8d3442143dde349cf2266c05fbcd6a0d texlive-latexconfig-20180414-25.el8.noarch.rpm f6350887bd843aae014e05be4dd1b68c3d8a1bb979f0c3854874e60fc85d75d1 texlive-latex-fonts-20180414-25.el8.noarch.rpm 99d49a2058669b6cea75c838f8dc60377a97968da4c0adc4a2b7d1c62105ad18 texlive-lettrine-20180414-25.el8.noarch.rpm 18ac14610862174055193fcfc8f92c4896b6e072fc6b7d93846509d7806919cb texlive-lib-20180414-25.el8.aarch64.rpm 83373c612ba99dde1f65ac7d59a86dc1c01f0761ce97bdbc6a9e227f52e4e8e9 texlive-linegoal-20180414-25.el8.noarch.rpm 17a540d30b87179e82f04f95044016a8a3196e3bd2d9c7c983838cb0bd6aff23 texlive-lineno-20180414-25.el8.noarch.rpm cd88664332fe8c95af24764d2aa5d70d4c5687b0ad51d26f02a29d50a7911dfa texlive-listings-20180414-25.el8.noarch.rpm df817cbc6437c1b330e04ff0ee637f020379db5f26be036710db38d926ebe0fc texlive-lm-20180414-25.el8.noarch.rpm a43a83b56974831f16c56e1b458b4616bb5215cb38a21216ee5ecf853477f71f texlive-lm-math-20180414-25.el8.noarch.rpm 9675429d5a1e86c365d6d30e6b24c62333854663fd877f4ab0b800013793e905 texlive-ltabptch-20180414-25.el8.noarch.rpm e872d9ee5fa8f51674dfaec52e67e20ce36c45c2b3c8d215ddfdd82658c2cb3f texlive-ltxmisc-20180414-25.el8.noarch.rpm d51b41cb80f149bad6bfcb7f4337324c9f2063ba2b3ef1f2c3dce228f9738614 texlive-lua-alt-getopt-20180414-25.el8.noarch.rpm 18f40d591be91254609786eef831c3a8e5266b64f619eea6c4f01111b96b22b3 texlive-lualatex-math-20180414-25.el8.noarch.rpm 45c6f362f69c2167db6ab9be39373b553c399c236f3743a56a24e80fa9841a47 texlive-lualibs-20180414-25.el8.noarch.rpm a202f5e225ebfe8d6340bafcd895689d053fe11535cc97d5520c1e738f130c98 texlive-luaotfload-20180414-25.el8.noarch.rpm 5628b1e7218de322325c733135a47a99a9e206eeda19002b450cd7fa6785cdcf texlive-luatex-20180414-25.el8.aarch64.rpm 04f510d4593e9d15a4990a54b942509311b3c2f8a0d701ffae5737acbfbc559c texlive-luatex85-20180414-25.el8.noarch.rpm c1a2c397e0aeff46fba1fc4664cc470d28cd739f6f2afe8170e3c4fb8fcb8839 texlive-luatexbase-20180414-25.el8.noarch.rpm 50ec4283fee306496c035ac524b5470804014285bd4bf89a6500cd088d7c2853 texlive-makecmds-20180414-25.el8.noarch.rpm 774f6d3153733bb4d24ecaaa327e16c8d4e2a7915c8b0fe8cf8bf5fce114e26e texlive-makeindex-20180414-25.el8.aarch64.rpm 46af2fc87f3240b32574fd3d2b93fa098bee8bff2a9dd18e8205692aca5580cd texlive-manfnt-font-20180414-25.el8.noarch.rpm e32a787b9eadf4b4412ba547526cc6c1d9c973dfd6ac44ee3d2c23ec9a8c4fdd texlive-marginnote-20180414-25.el8.noarch.rpm 534a303cf09733b0d350e7486f5a528da2182057c5f7063b71b294b1f4f67e62 texlive-marvosym-20180414-25.el8.noarch.rpm dd234505323dbebd91af7d1331c58b2f35c052b11b832b071b7e2fc4ca8b5080 texlive-mathpazo-20180414-25.el8.noarch.rpm 35eb507c030a39f41b3c2a5b8f4749062e0def1e2e7b6ca5006a1d7caafbde78 texlive-mathspec-20180414-25.el8.noarch.rpm 22a79e4b6f7dd83062a1605417effe13146f8db020d84ace36c1684e879eceee texlive-mathtools-20180414-25.el8.noarch.rpm 82bfd658f342d619a74788f5add542481f515d5e5e81b3832bf871378031a5e7 texlive-mdwtools-20180414-25.el8.noarch.rpm a0d99143abf8213c7a52ff3fe35163b0f1524cab1fbf44d5bd266e2d88dbf5ce texlive-memoir-20180414-25.el8.noarch.rpm 48ecbefa52ad833e2d581ae2d3a1ebfaab53903769c1c88e62988bfc02e546ea texlive-metafont-20180414-25.el8.aarch64.rpm 4172234c93ab44ffa13285ca9617e82549f565570d916eca30c7e9c3856dc37b texlive-metalogo-20180414-25.el8.noarch.rpm c73ca4002a6322ba6217d277a9cba5b5341393575ddbab683769114c07492285 texlive-metapost-20180414-25.el8.aarch64.rpm dc9794ef0925fa7354e93d5c261632df28ae012669e53c6c51b5ca5eef312095 texlive-mflogo-20180414-25.el8.noarch.rpm d5e09ee5e57418a0f5db2d6835e5c78154f3af207a2924928c04f593a2e434e2 texlive-mflogo-font-20180414-25.el8.noarch.rpm c30b3ee3a199cfd9db95af15ab1852e72b47e0dfaffa3179fe814b81b0633472 texlive-mfnfss-20180414-25.el8.noarch.rpm e4d3390b08d13940d40d8aeeb5f60fa448475d4e796b0c5616abd1c57a838589 texlive-mfware-20180414-25.el8.aarch64.rpm c72b6c637fa307dc94de6a94c45fec6f0d5f514acfcdea0f672dc4ae8dbe583f texlive-microtype-20180414-25.el8.noarch.rpm 4de0d5b9a16759f013e58e2e0c11270c361368ac241f07b6d30fc2e63fe4e890 texlive-mnsymbol-20180414-25.el8.noarch.rpm f41f869c0ed1c9ea995dbdcb64d1527967507c76e7d2d68be2f53212d74be7f0 texlive-mparhack-20180414-25.el8.noarch.rpm dcaa60499e96de0f2e93cc3e6bc7e678083ccc83debd1f026d552cec26ffddd7 texlive-mptopdf-20180414-25.el8.noarch.rpm 2c25f2ae32ce0457c8e67fa50795879016b0bcb0cb26818001b5915f5dbce6e6 texlive-ms-20180414-25.el8.noarch.rpm 88feaee2b09fba1b903a125b7b0ab341f430a2ca1423442e2a181049e51e49fa texlive-multido-20180414-25.el8.noarch.rpm d96dbdb72bbf4e356297840c068f7d9f72f8371f60a884e83446621be0f46afe texlive-multirow-20180414-25.el8.noarch.rpm 0a4bc9a20e80838fec4a9a4b73d1542ca45f194cad976ec289e479d00228b32e texlive-natbib-20180414-25.el8.noarch.rpm adc41d4c74b9259c6c3ece655bd794e90b6158460292d24bffc093779c67b711 texlive-ncctools-20180414-25.el8.noarch.rpm 6fe54ab452e8929cbcea2859141d8c5101f2bc672f14f3dde651b4fa621bfee6 texlive-ncntrsbk-20180414-25.el8.noarch.rpm 8ce1f2250d99fca85c54d882fe34d5a03705987f54a9fec0e5ba34638fc62e28 texlive-needspace-20180414-25.el8.noarch.rpm fd01f1502e7b12c8c134de9d3c21dc7130eacac6b208bf091ea36104e7d80d31 texlive-norasi-c90-20180414-25.el8.noarch.rpm d356098a3f8e4139a61293a9b2017eb385ed4fe03e45ef7a6a5a38d1779d474c texlive-ntgclass-20180414-25.el8.noarch.rpm 47e6563a34553c27336b26f231813a934fbf0b133797c094db0b8a92b8bc45f4 texlive-oberdiek-20180414-25.el8.noarch.rpm c4f78115f5941f30b4cec73c333bbe9f28e05e6dd15378620c280cf2cbeb74ba texlive-overpic-20180414-25.el8.noarch.rpm 0bd77cfad3d486ef5eccc6bd76db6595c227d06f64af84d6f3ddb551761d41fd texlive-palatino-20180414-25.el8.noarch.rpm fbab36b6eb3d0e5830dc2c9f5528f4ed9680ee7b6ba9bbbe4e844e31a64d55ce texlive-paralist-20180414-25.el8.noarch.rpm 65cbad2a2bd3d02142bce2a3328555427de1e1e4c759c1bad5448a39a62c9634 texlive-parallel-20180414-25.el8.noarch.rpm a31f6791e6e655b0b66a812c9ffd2ca2dffa1dbfefb6b071df9bbceaf72817ac texlive-parskip-20180414-25.el8.noarch.rpm 219145f10bef96d44dfe335fd5c24c416b0f8c43eede287c3e5b7029c23e7736 texlive-passivetex-20180414-25.el8.noarch.rpm 92fbb08b208144eda7b4a464fd5c4efbb97fd82eb405813084ad04bb0f96f2fd texlive-pdfpages-20180414-25.el8.noarch.rpm 0986d7b17250c3fb1c82fc79a054d6ecb9b6fdc4e2bf29fe04a5e754f8cb0676 texlive-pdftex-20180414-25.el8.aarch64.rpm 78b4f0e93c1603230fa48129a0d5d3ce417f0b83794cef83117dd2df951655e9 texlive-pgf-20180414-25.el8.noarch.rpm 0bf2cbee865bcd8a11b66d3d3debf7b23d5c709d889e123204643e7c789ac6a7 texlive-philokalia-20180414-25.el8.noarch.rpm 5c2a31f59b06b209ced2e80ad748ae93a37a6b0766328318a9d1c7de949323e0 texlive-placeins-20180414-25.el8.noarch.rpm bb335518be3f6cf58a647e8459a6def0c45414d358c97e0f6e63935b02bcac39 texlive-plain-20180414-25.el8.noarch.rpm a353307674babae0fef5a8dac276ddd24865411090a07d2d25db65d199a552e9 texlive-polyglossia-20180414-25.el8.noarch.rpm 1f51009f6544e02913d10d2858c47864e1331b2b454fecd95bd24433513b4dd2 texlive-powerdot-20180414-25.el8.noarch.rpm 70af03e6053f314d9efae179aac1d51f92322ad5eba646c84483a57e286d78a5 texlive-preprint-20180414-25.el8.noarch.rpm 7afff60b06f4d111df798968bb474346b27ffd73fc2b3ad9b85d4b7a6096cf21 texlive-psfrag-20180414-25.el8.noarch.rpm 05f0ced6fd71a472aed639bab8f342b90e805cc560fd91639f8517c036443d42 texlive-pslatex-20180414-25.el8.noarch.rpm 272991b52d494c7292bbb8334a62ae2c5488686896995789faa1cddcc602b3ee texlive-psnfss-20180414-25.el8.noarch.rpm ab0a95d0382c3a04081e35ad454f9c8b6c88e39decd5c7b9db35f68a9817b9de texlive-pspicture-20180414-25.el8.noarch.rpm cf6635958123cec7334afabd5571e20cd6d314af93aa0489145c27a32378214a texlive-pst-3d-20180414-25.el8.noarch.rpm 11f1f35cb58803a14abe85ccddc5d32ee1232e722893828fcddfcc6d706bf470 texlive-pst-arrow-20180414-25.el8.noarch.rpm 02121d865d6d5689c916fce5034f4c2010d2f00a57f20ddcafdb02a50b629104 texlive-pst-blur-20180414-25.el8.noarch.rpm 9bcb9490e950b77bad3062e02bd395048f291894ee2eab09eb68edb7f6c600e4 texlive-pst-coil-20180414-25.el8.noarch.rpm 588e80c601dd58aeb0d192aa3ca368cb24aa4476f71ad9f9622977addd31aed0 texlive-pst-eps-20180414-25.el8.noarch.rpm b6c76a89bae25dc541c94a0772a9e6485b80b9ce2d12fe3cfa44926716dc4a97 texlive-pst-fill-20180414-25.el8.noarch.rpm 375a3b10789c41e1dbe6c96a8ef987cab63b4b3c32101fc4e54205cc61e9cf76 texlive-pst-grad-20180414-25.el8.noarch.rpm 1088f90608ceea2e38839c8f72d8a5a71213e0f8105a59e0491b15edd413ff74 texlive-pst-math-20180414-25.el8.noarch.rpm 0e06b4a02bcd8fd2931da4ae6ed99dbce79a7cff6ab7712c47a4a6a1236b3e7f texlive-pst-node-20180414-25.el8.noarch.rpm bdeaa5b94bf2d293df988ce49c13ba87abe22f6aa296fecdc8b8851ae9ade40d texlive-pst-plot-20180414-25.el8.noarch.rpm 967a715fb7176081efa0aa708877e8b19663fe760e135f78b4366ffb8a1874a9 texlive-pstricks-20180414-25.el8.noarch.rpm 350d5a6b13675349800183883c8b88c5455da7b6d73c3a4558f1e1b503cc69b3 texlive-pstricks-add-20180414-25.el8.noarch.rpm c312c0baec64e2af4fb550e7de79904aede52e7ca3d27e8dd9e5f64789fd8d24 texlive-pst-slpe-20180414-25.el8.noarch.rpm bdef81872dc1d9a8928916628ded266b1d3adcd203b2a21bc2c4bb9da821d982 texlive-pst-text-20180414-25.el8.noarch.rpm cb490a8033b1d8ee9a0a31021cd96c5ba2b8d21b8ca71cb459a085f4a0f43f25 texlive-pst-tools-20180414-25.el8.noarch.rpm 877d31ae68ec45b838935059d10bd09a249c615227fe5b6276c3956ec7f71259 texlive-pst-tree-20180414-25.el8.noarch.rpm 36792c67326e69f07a9aaa803ab65c972c3996b12d4fc3fa0571167a679153f1 texlive-ptext-20180414-25.el8.noarch.rpm 14a6ce72f4d61766c2f46f5866ec5e24fd429768732cffe4baadf9f028086e6e texlive-pxfonts-20180414-25.el8.noarch.rpm 600cc954569ef159eaf9f82daeecc817082bdf1e5861f38d553b6786db4641c5 texlive-qstest-20180414-25.el8.noarch.rpm 81feb479ac5f235eed04cd3b1f81ea0c1ac4b00b4fbf209f0a4820f00ec7289f texlive-rcs-20180414-25.el8.noarch.rpm b183bac2702ef64acd4c71c048d54a4b0855fc34dff00d216c4432c9b3f5f40b texlive-realscripts-20180414-25.el8.noarch.rpm d7571451e6ee87a7a0cacec53222391f2a13120ac3eb4dbeacc54927e2651309 texlive-rsfs-20180414-25.el8.noarch.rpm afe0c0d8c8c14f1c8a87c4c3782e8b72a61a529a060e735f1184cb6942d7837a texlive-sansmath-20180414-25.el8.noarch.rpm 74a6f3e2b7f427381fe302351c0ecc71b9de04fbb7b8abcd49a293bf294b63fb texlive-sauerj-20180414-25.el8.noarch.rpm 05865812ae0fd775d087c248df99b21b0b13035b6bf041622492c866e29dedce texlive-scheme-basic-20180414-25.el8.noarch.rpm ad82a5c66a559a3ca89c8dd34b298b90c2450bc47f72736a4bb1303a5e6c0174 texlive-section-20180414-25.el8.noarch.rpm d412cc0b4acc79976189331ba7cbeabd0f8086daa3e0c0f3e462e346a96f86e3 texlive-sectsty-20180414-25.el8.noarch.rpm 7d8e65b6af455c15fffe03cd53935941e0f0966ce93d6db8ac4ecd0bd8b999a7 texlive-seminar-20180414-25.el8.noarch.rpm bec8e7f734861c4d1fd6961e261aa41f63d4bf335775c60ef01806d937fcd921 texlive-sepnum-20180414-25.el8.noarch.rpm 08589b08f704af9d6b3960555ee5595706e8f6e55e49b706376d302d3c5c4c55 texlive-setspace-20180414-25.el8.noarch.rpm 5d1d45047e7feeabef98c2cd75289d35807ad80c37a0624cb3089c80f1f44dff texlive-showexpl-20180414-25.el8.noarch.rpm 82a67a944b3108b82ab58a93d51d9f7231a3a323689a44967fa4e8a89e351537 texlive-soul-20180414-25.el8.noarch.rpm 07541f907438b8d1741b4f6481241b886ecfac4a24656b4452ee6f4cbf189792 texlive-stmaryrd-20180414-25.el8.noarch.rpm 30ebfef7fa0e3733cb142762b6a316adc3d213dacabd7306a2754be6db5f421a texlive-subfig-20180414-25.el8.noarch.rpm cd94656b9ec84434f024eae054cf96600b38d9dcf66a1b43c5fdf69ca5695db8 texlive-subfigure-20180414-25.el8.noarch.rpm 2b7e3d38f128bcc34365ff2c685956e29b38e16b80febbe16abc7a41eaeac06a texlive-svn-prov-20180414-25.el8.noarch.rpm b4de9215e7fedcfd6c87c976ce54fc096dcb12b1f6dba4710ff775092ff13c4f texlive-symbol-20180414-25.el8.noarch.rpm a83714592e9fc0d2a3905f6f656e3e4c65043a7bcfe59105436ce3eed1580d25 texlive-t2-20180414-25.el8.noarch.rpm 2b0673fc72a9b98feaf4ebbeac0c50aafbfae84cfd4cabd8629a0a5d498c1e35 texlive-tabu-20180414-25.el8.noarch.rpm 953e85f3d77553697a9fcec9d9f072e35cb1f2dab217d8d1883adccec0bb5adc texlive-tabulary-20180414-25.el8.noarch.rpm dc0fbcf1551b693860890758a2122dea684d650bca657bab6ff888ec6c17f212 texlive-tetex-20180414-25.el8.noarch.rpm dc497274a99ee79d02febbf97280d48b7c2067d527f682043c47b2a6b50bf62a texlive-tex-20180414-25.el8.aarch64.rpm f944826d0c55aff04e029488059110f295c1560949749fd527e00074f044a3bb texlive-tex4ht-20180414-25.el8.aarch64.rpm 7f38379a1b05b1c1ae15f63628f4635ea6d1be2ae7ed2a5384ddab723d446595 texlive-texconfig-20180414-25.el8.noarch.rpm b9fa8f9f1be36d80c4a43a4a59a2944da6996cb07a7e966f24087640ba000150 texlive-tex-gyre-20180414-25.el8.noarch.rpm 6267176d8af8daf75f79ffb1523f7acce018d3e494e43d5f678225fbc749cbdf texlive-tex-gyre-math-20180414-25.el8.noarch.rpm f02fcee0961a55dd7d0ec6635ecbf59e48eec79ab37cb0035ecb2cd04c1a02ef texlive-tex-ini-files-20180414-25.el8.noarch.rpm a7e69cd3d53f2875756562dedc8b8646c61d9d035522555d34f85359d449f34a texlive-texlive-common-doc-20180414-25.el8.noarch.rpm e2fd4f12c34ff93782e4dd7d9da12bd3f371b37edc8f5a5cc808dbec7855c711 texlive-texlive-docindex-20180414-25.el8.noarch.rpm c5d5af7a9b8d3052e5fb6b17b79d1b26ccbdfdd128bff0e7e7eea7d90b3348b1 texlive-texlive-en-20180414-25.el8.noarch.rpm d389c653f60ffe65c97062dcf1be0cc9b8450bf210bd3758cae9fab226d4da83 texlive-texlive.infra-20180414-25.el8.noarch.rpm fbbf3ea1e691f40964556f0976050962e0c0f0ee9cf2c59fd7c054c19b26c807 texlive-texlive-msg-translations-20180414-25.el8.noarch.rpm c7a47e0cbfd0e9efca1f920d58496c3185a966b30ce2ac37d70230044eaf90b4 texlive-texlive-scripts-20180414-25.el8.noarch.rpm f5e8607ea1c58414fae42b5324e37909020f0b814b3785105681849a794f0c21 texlive-textcase-20180414-25.el8.noarch.rpm 104a4089ebb2151b1cc04bc788ce542d6eea029d659e901d9a48cda981ec35cb texlive-textpos-20180414-25.el8.noarch.rpm 20d44db43a3ae1fd285bb459da40d86090aab9ca5c92bcdbf69286879c9af478 texlive-threeparttable-20180414-25.el8.noarch.rpm d35abc2b7c31a863117bd84c0142458251e8df5538b23144100e01cec7ae433c texlive-thumbpdf-20180414-25.el8.noarch.rpm f2c65a773c9b4ecb993dacbe9f50f79f54bd1e496ab3aed9cd37ed778bda3846 texlive-times-20180414-25.el8.noarch.rpm 2a28c27625325022e853bf6529d337f1dddbb339457e7e5546788dc1025248cb texlive-tipa-20180414-25.el8.noarch.rpm 0c49aae89d6b86cae3743bb2c0a34614d05b15c7299f1c54c8bfaae10686187b texlive-titlesec-20180414-25.el8.noarch.rpm d52f34e34e3fb42909d3c2d1a6802cd801e856af8e7a102a73b9ff2c5fa25b93 texlive-titling-20180414-25.el8.noarch.rpm 912b1dc794180ba10b6c4029c89aef8b04cb46d95846fd8374b31810760eb88e texlive-tocloft-20180414-25.el8.noarch.rpm 7dd0625f7b434efa408f54b389baf7a535ecefbfabf69fb2b56ded1734928d20 texlive-tools-20180414-25.el8.noarch.rpm 9b747ea9bf5d545c90927f07416d5e2ed2ad1f88a4e2bcafc5b7863ef692b03a texlive-trimspaces-20180414-25.el8.noarch.rpm 15a26867bc705b19b949201fdc753ed5260d55b662a39493042069b03307d484 texlive-txfonts-20180414-25.el8.noarch.rpm 9abe447a5b9f43516bc6707100a37c90a09a47faff6dbc88ae8ece8b5092d892 texlive-type1cm-20180414-25.el8.noarch.rpm 53e9e8d5e24bab93317baf13ca4fb751c32794850c15439df41256b15fd8e876 texlive-typehtml-20180414-25.el8.noarch.rpm 6d69c4730e5b935accf6a65be8743488293d2a55f39beda698f5804b779cbd79 texlive-ucharclasses-20180414-25.el8.noarch.rpm c269d8eb7f8fd28d22cf8de8e8f7e71c86f5604dac61187d9c87def684f0cfa9 texlive-ucs-20180414-25.el8.noarch.rpm c3b331878f149cf7b2ba3e239bc3e28808f68873f7f8eb9eef2c48620a837120 texlive-uhc-20180414-25.el8.noarch.rpm 286ac130a0d6b5163eb04b5a61ff1c9dc059fb648a1cec93dc24aab728feab92 texlive-ulem-20180414-25.el8.noarch.rpm 02321a09505fedeaf342564f9ea842871d56a5f11a41bc8d483fecb01f5f124b texlive-underscore-20180414-25.el8.noarch.rpm cc60599bde0aaaae03130de033d9f5247b60ca2db3fce343f2e40f22e5897b23 texlive-unicode-data-20180414-25.el8.noarch.rpm 6ba01e3a12043d988418fd722dcbe35ff27db55da051631531ae6cec7e548be2 texlive-unicode-math-20180414-25.el8.noarch.rpm 9b0e96ab993a164ab8dc5860d7d541e942b394a03d83da9c2c47f1a88993f74b texlive-unisugar-20180414-25.el8.noarch.rpm c249b8b049c232637ccd9aa067f1730133da0e1d9d24d945ba7bc7a64a38a69e texlive-updmap-map-20180414-25.el8.noarch.rpm bfb2b0eefa387a9b82412c6adc95eab799ec148f87586820867f31088f3f363d texlive-upquote-20180414-25.el8.noarch.rpm bebbe238254bf2b2ba67ef05b6ef58c1a4800f621facdd7dce14c34aa7dd11df texlive-url-20180414-25.el8.noarch.rpm c2f8aa3df0e581f7dfc952def1d613bd5561e768cbbb53e487fcf3712c66122f texlive-utopia-20180414-25.el8.noarch.rpm a562b2f297800da4f65a2cb5f4bdd95929499ae9d956940323c6a831f5305af2 texlive-varwidth-20180414-25.el8.noarch.rpm 1abb88c659a224bf9c30a14389785cd6e952429dc1007121e01865765cb7a33d texlive-wadalab-20180414-25.el8.noarch.rpm c6be2bf4f1abbbc548a2963a376d50f8d4197e1e937350fdd2c34eea485004a3 texlive-was-20180414-25.el8.noarch.rpm 33b9b27340002619548d4defb2bd172a597c4b7db59379663ccfb3ef64b03840 texlive-wasy-20180414-25.el8.noarch.rpm 8c9c07704e7042f3eb8eb21cbee67da44dc45c83095c44af6b9b092bcbd5c706 texlive-wasy2-ps-20180414-25.el8.noarch.rpm 7f4a1104098779f6e50799b61f2ec282725da567b3b702f6c4e03f1e52620672 texlive-wasysym-20180414-25.el8.noarch.rpm 6267c122a0d713e10ccbd05405bdb1a91acf4502063de9a10894bb0411990d37 texlive-wrapfig-20180414-25.el8.noarch.rpm d48b2af8a2e89add3efa2d8aaeffcd07f17d58925c8ec14cdbff22d9eb9461c9 texlive-xcolor-20180414-25.el8.noarch.rpm 1e465a883df073586356d7fa7971af219cb86aa0ff5ee99647cd0a711070d62b texlive-xdvi-20180414-25.el8.aarch64.rpm 8fb24618ebe8ce4e2d6c2da39649d540980fc0b3b2357590767c667e22a1d83c texlive-xecjk-20180414-25.el8.noarch.rpm 2881b95baad014b507af066f1a63af9cee781a1853a802f5830e6d3c82c8be52 texlive-xecolor-20180414-25.el8.noarch.rpm e93e06b8b0666dc24439d1d710ba2fbc4961e395e371df86cfc9a1136f1b8324 texlive-xecyr-20180414-25.el8.noarch.rpm 509ab80d239ba3117657c531301cf375f48e23f0747e9451a9a3699ad88d9bff texlive-xeindex-20180414-25.el8.noarch.rpm c23448e339a26848e66687faf56a3eaecb91bc7c26d1a20c2af16cb8b5cefb98 texlive-xepersian-20180414-25.el8.noarch.rpm 6064d741e9d670b84ea1268c2dc07f1e05742b8480b0dccb39e1ec50239a5876 texlive-xesearch-20180414-25.el8.noarch.rpm c3846e7f8543ecc09ba3705d06c4cafcd36bf9c6e8fc9c9747a0df620c2a9101 texlive-xetex-20180414-25.el8.aarch64.rpm 684f3c210b71ee63dbe5b5db310d6f3a39cfb7f6475531fa3ac15a35008151df texlive-xetexconfig-20180414-25.el8.noarch.rpm 14adc8d26d29de3280dae6bec4944e7f6b107f251a65e13e0c0cbb4cc8d218b4 texlive-xetexfontinfo-20180414-25.el8.noarch.rpm b3f8eaea4701216a1a911b4cda144f0c5357f9d71a8566f1b1d4491a02a808f0 texlive-xetex-itrans-20180414-25.el8.noarch.rpm 9ead8f4f0e698479a0a30ac2972bdc0aa0c36a3073458ff0cd7decf723498a60 texlive-xetex-pstricks-20180414-25.el8.noarch.rpm 1a3ec47824bfb71c08f48dc9e14cedeb1361aacdde77c3980937d2dcae43da7f texlive-xetex-tibetan-20180414-25.el8.noarch.rpm 7cbe5fcede6edfeaf6eee9d7da0f385f6d40d8d3412a278ada5794f75f39317f texlive-xifthen-20180414-25.el8.noarch.rpm eb2cae8a1c6924a49608b396ad1783b9cb97068d4cbf23a4515ecef1007e1be8 texlive-xkeyval-20180414-25.el8.noarch.rpm 42781c9ff19986c35e9d946809d8b8bffb7a93a00eb70598aef9213e7c1edd2f texlive-xltxtra-20180414-25.el8.noarch.rpm 26c45537cb2def83be67ab6d67aab7d713d7197f2d77099eb14dd9832d0258bd texlive-xmltex-20180414-25.el8.noarch.rpm f853df1e34b90586308a6eef776677f90f9b6e6e4e63a8d60d036e2aac58f807 texlive-xmltexconfig-20180414-25.el8.noarch.rpm e75afa7cb9209710b5f8f4d61b673ac1b570e73341c78a69401e4aa174848148 texlive-xstring-20180414-25.el8.noarch.rpm 1f483cd72604909d8f2a7a1b59e3d10d31cc6d31d652ba10c4a7463e5c926df1 texlive-xtab-20180414-25.el8.noarch.rpm fb06b9814d301d7d9f40ca73f233b6b645dc8f7259c277b9fa0e9993d53321b2 texlive-xunicode-20180414-25.el8.noarch.rpm 24419ed5a08458703c8e194c1a54ea9a13cd96256dc92f2b3eab1cbb6c82f057 texlive-zapfchan-20180414-25.el8.noarch.rpm f41cb46d0c5aaff3f9e45c0659527d4ef7713ddaa1ce35dfc29181c0303e87c0 texlive-zapfding-20180414-25.el8.noarch.rpm eff7eaa41dc39ba23b87ee895773c7b4e256a48ac830736aaae6622367001393 RLBA-2022:1892 sysstat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysstat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sysstat-11.7.3-7.el8.aarch64.rpm 071429c0ef2f9fda29e65a06cc4cb6c9cf6e39d631c5e9e9a3bbeda7aebb6100 RLBA-2022:1897 gcc-toolset-11-systemtap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-systemtap-4.5-6.el8.aarch64.rpm 7c5c802f9e6486a9c0ee28e87b9a770cfa498bac741df7a1d39ead6d440b319c gcc-toolset-11-systemtap-client-4.5-6.el8.aarch64.rpm 13cf4db1b05ecba834ff594107edf98580d1e1920a72e1a9cabbc2a33679a2d5 gcc-toolset-11-systemtap-devel-4.5-6.el8.aarch64.rpm 414677fc632a949042566e9680848ee985de839cd9f126472a15e951c5a92538 gcc-toolset-11-systemtap-initscript-4.5-6.el8.aarch64.rpm 011fca4f52294139256623548285005f564d3728906f8e3c1e084942eb6445ff gcc-toolset-11-systemtap-runtime-4.5-6.el8.aarch64.rpm e26e7f6e56480a203e43383dfe9325e6982095a46ce61cf904837ab9fface201 gcc-toolset-11-systemtap-sdt-devel-4.5-6.el8.aarch64.rpm 3f71a87c95db3598fc743464ea8815e982f09c99a0853ecf581a06f0b324eb57 gcc-toolset-11-systemtap-server-4.5-6.el8.aarch64.rpm 6963d6e72b7fc8dfc6f44fea7be6a0fbb29ced834f99e5fadfdcb03062a0fa6d RLEA-2022:1904 new module: php:8.0 This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the php:8.0 module to Rocky Linux 8. (BZ#1978356) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm a05196d406c6018fdfbe6f70e2c016ddd81305ed02ec9966922cc91a01042fba libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f157c5b6ed5f6b65b73a42bb7cb94e92cfda9ba190ea707addd1299220f60547 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 983d3df277f937fed5b4afecbfa329f8e8d127f28f279a061dfedd80c7b5cbaf php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm dbc9d1a4dccce66ed75a1a3aa458dddc86d92baaba8cde6de288552accb7ede2 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 182ea4f209bee5fc3c099f0db4b68cf95083244cd7df9fb331be559a8ca6f0ad php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f70c1c86d7980dce552fddefdb2d1139da17ebe2b40705d25c26827eb6dee241 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 129f337de743773a02b9051d756f200659b1adf72890187215a6a69eea834ac6 php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm e211ce74e31de0df200fd0a71f228f576092c564bda558fe8d5c951794ac60dc RLBA-2022:1913 tcpdump bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tcpdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tcpdump-4.9.3-3.el8.aarch64.rpm 987d77e7b7e14b16f8b4f99a5ddc5852bfc98e42e2badec0ed80b3c6f1ee9b60 RLBA-2022:1914 libosinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libosinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libosinfo-1.9.0-3.el8.aarch64.rpm a6a6f507222ff73d3ffae9a6b5a55f38d156b4cf80211e3bb7606bce0b923d30 RLSA-2022:1915 Moderate: httpd:2.4 security and bug fix update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193) * httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160) * httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224) * httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193) * httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160) * httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224) * httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm 9e61f8a994beaff9e74f4d92034eadaaefdb3eddc6f4916a41f4158ed613d6bf mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLBA-2022:1918 webrtc-audio-processing bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for webrtc-audio-processing. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms webrtc-audio-processing-0.3-10.el8.aarch64.rpm 653ed00f225ad5f4feac1b0fa56014ea38281b4df96dc92360ef73a2cc925759 RLBA-2022:1923 gnome-session bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-session. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-session-3.28.1-14.el8.aarch64.rpm f2c9e061fc69b80116f2a13580f87cff174c6c5eee9655ce10bca63f636b0f74 gnome-session-kiosk-session-3.28.1-14.el8.aarch64.rpm 34f8e216c2a0a219e1195d9f8af9ca12c2c181dac4977a5ca80d15b7fb28797b gnome-session-wayland-session-3.28.1-14.el8.aarch64.rpm 593934438c57bbcdf1f25ea420736b9181a52dcf96fc00c11ec26a0517a0d71d gnome-session-xsession-3.28.1-14.el8.aarch64.rpm 98dc72e442612d39d37b2ab272a8e6fc2d1d2276c6423dde60e937733ece5ec2 RLEA-2022:1926 libreswan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libreswan. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libreswan-4.5-1.el8.aarch64.rpm 2052caab310750487c5c56f74de159c24e380602ea545bb3ea432881e5d31e2f RLBA-2022:1929 gcc-toolset-11-strace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-11-strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-11-strace-5.13-7.el8.aarch64.rpm d53ae7109cc7307b777f67c18ca4938a6969217c9bd2e34490693da9736bb0bc RLSA-2022:1932 Moderate: python-lxml security update lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-lxml. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-lxml-4.2.3-4.el8.aarch64.rpm 55763102fe54ba282332215d67e2a5b9972b84cf4a1ca94d08217d3c369bdd25 RLSA-2022:1934 Moderate: mod_auth_mellon security update The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Security Fix(es): * mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mod_auth_mellon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Security Fix(es): * mod_auth_mellon: Open Redirect vulnerability in logout URLs (CVE-2021-3639) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mod_auth_mellon-0.14.0-12.el8.1.aarch64.rpm 401c60856f299c02a77af736781042317af93d6cd7f00039298d481624829800 mod_auth_mellon-diagnostics-0.14.0-12.el8.1.aarch64.rpm 1f0b441375f9dc0d910c5fdad0bf8a2d9c05d8e1fc004a05bd600b0a415d7e07 RLBA-2022:1936 vsftpd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vsftpd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms vsftpd-3.0.3-35.el8.aarch64.rpm 5f7e6b75a346f35e4e3ed1243283875107205e65700e7b672fcdb1e5f547dbfc RLBA-2022:1938 hostapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hostapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms hostapd-2.10-1.el8.aarch64.rpm d18deff2dcca47067767abb26eed67ca795a03f1b553900115b076656201596f RLBA-2022:1940 egl-wayland bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for egl-wayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms egl-wayland-1.1.9-3.el8.aarch64.rpm 223cf978fff6769a1ae3ff7a02cb6b36275cbe4f6ad4666a489890f068860a9b RLBA-2022:1944 netpbm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for netpbm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms netpbm-10.82.00-7.el8.aarch64.rpm 151fe5072c94f9b9086acd8de79058b42bc702248d3310347dcf937693118f46 netpbm-progs-10.82.00-7.el8.aarch64.rpm dcf4590cee9fc1755ffd9a05c926baa1a0dd75f1246e29b292f201de5f3df9a8 RLBA-2022:1949 python-pillow update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pillow-5.1.1-18.el8_5.aarch64.rpm 5ba0f740bfa6a544ede47a03dcdce51af6efe2427148f62814b56a5223bc6e85 RLBA-2022:1951 man-pages-overrides bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-pages-overrides. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms man-pages-overrides-8.6.0.0-1.el8.noarch.rpm 438eea287fbef077194471c4ee49641f682af62a0691c6fd1d8b0ab298c21f91 RLEA-2022:1957 perl:5.32 metadata for the Rocky Linux 8 module matrix (4/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__perl-DBD-Pg perl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.aarch64.rpm eddf1fa38dcadf4f605d7606a74e26de941e7b8b134efca153b85b66e0c3f1e6 RLBA-2022:1959 scl-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scl-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms scl-utils-2.0.2-15.el8.aarch64.rpm 29c073245412e879fc81a714d3630762cf121d885800f7013d5c531e55729d16 scl-utils-build-2.0.2-15.el8.aarch64.rpm b83239e25dfd6e3b73386a2dfa36d739fd877dd2a8b064a18cd2763ef34dbfbd RLSA-2022:1961 Moderate: cairo and pixman security and bug fix update Cairo is a 2D graphics library designed to provide high-quality display and print output. Pixman is a pixel manipulation library for the X Window System and Cairo. Security Fix(es): * cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pixman, cairo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cairo is a 2D graphics library designed to provide high-quality display and print output. Pixman is a pixel manipulation library for the X Window System and Cairo. Security Fix(es): * cairo: libreoffice slideshow aborts with stack smashing in cairo's composite_boxes (CVE-2020-35492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cairo-1.15.12-6.el8.aarch64.rpm a2f61c36e8e33f99be42c3f06a6bf00a8291c5d4b82dd26d46678e6c37aa7da6 cairo-devel-1.15.12-6.el8.aarch64.rpm b3d47e7466e37cafbff9c24f12cc070ff903624c6cb92e7047763543d25bb0f2 cairo-gobject-1.15.12-6.el8.aarch64.rpm 391dc7858d21461e430d8b140cca7b66709afa46b7414474d6a4cbb30b8f6c88 cairo-gobject-devel-1.15.12-6.el8.aarch64.rpm 91f4c94a645d1c0100ce709b65c4f336766b6d87709d2ac0ee7b9772e2e11bc5 pixman-0.38.4-2.el8.aarch64.rpm 7a396bc25a897c6cebd9f43bd0994c652facd8c5ebdcadc60ce4d5829bbada4c pixman-devel-0.38.4-2.el8.aarch64.rpm dc97ee83ce06f205912c2a614b413e6435b626b316847653e59f16d1d55754fc RLEA-2022:1963 new module: log4j:2 This enhancement update adds the log4j:2 module to Rocky Linux 8. (BZ#1937468) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jctools, log4j, disruptor. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the log4j:2 module to Rocky Linux 8. (BZ#1937468) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__log4j disruptor-3.4.4-2.module+el8.6.0+895+381d2531.noarch.rpm 6809ec19964e8ee53bf70611ff4096cd7e87c5728f84e9d179219188077d3366 jctools-3.3.0-3.module+el8.6.0+895+381d2531.noarch.rpm 4bea6a0d79011efd19bb2d988bcccb04d5701625eadf5f29d0ce32bc3861f3e7 log4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm b1620800770b3aeaff9e53cc7a4fb9041956028dbe2d3efae1157b87b162448c log4j-jcl-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm f6205522d8453908ed1ae3e2f046942626abe705531f0b7c2d67783c6502f794 log4j-slf4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpm 4c36fcf064876fc64b9f5ae9faee4474b2e30e6031af1f6bbd0f37a4da306284 RLSA-2022:1968 Moderate: libsndfile security update libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsndfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libsndfile-1.0.28-12.el8.aarch64.rpm 4853012074139192faa8278a029e0e140e1f3ee2ad6e72381f588cd8da6c216f RLBA-2022:1969 dpdk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dpdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dpdk-21.11-1.el8.aarch64.rpm d215568254319880976b8118b5e72ea193b1c14d66f20b34ce6e75f63196e006 dpdk-devel-21.11-1.el8.aarch64.rpm 4e30194a24700971415f7709cf3b785fa08389e7784154cace33b7654b755c51 dpdk-doc-21.11-1.el8.noarch.rpm eaf9c1a9cf87af38ac1c355969c6f845cfcb83a6e7abdd92962afb5cc41762d7 dpdk-tools-21.11-1.el8.aarch64.rpm 282665d36990dabd1aa24ae703af2bb221d45e259679bb4577d1ca70c108dbb9 RLBA-2022:2141 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * Udica crashes when processing inspect file without capabilities (BZ#2077472) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es): * Udica crashes when processing inspect file without capabilities (BZ#2077472) rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4395c56a677e11bf57b7c1627060cbeb814ae1dcf5948580ab371593f6494502 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLSA-2022:2143 Important: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * psgo: Privilege escalation in 'podman top' (CVE-2022-1227) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 crun-0.18-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 912586617853c37e9ddf8b951bd72f35172fe0452673b4a771ea9ab9cfde74c8 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c8bce58bb8faf13610b8212a0398a606c723903d32cdd511d125a492d5140f26 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.aarch64.rpm d265cd7a3d56fd2b95918ff1066f55d950833d6fbe7766873f7e4ead8d3b3fbd slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm a5b2c9bf2a92f9533b194472cf1d4a729879513b4796d3720b9ff97def54fec8 toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm ab2e6b9be7a0095f0c39f4b8da200833996f5c78628b8b7f3c3de1aeef9a6e37 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2022:2144 container-tools:4.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Udica crashes when processing inspect file without capabilities (BZ#2077474) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Udica crashes when processing inspect file without capabilities (BZ#2077474) rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4395c56a677e11bf57b7c1627060cbeb814ae1dcf5948580ab371593f6494502 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLSA-2022:2234 Important: subversion:1.10 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 1fec5b0fbe7cd56808db1debe0c83e67bd6125ff7434e697dfaf81385f3db818 subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 0e39e420e746701a8e6b1577927d66db8170bf4a2b977e0ce0814dd0647ee0c2 subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 6f0d927e107c35f15de2616b627b69af6c58a3dda2eceb38f43be47997446054 subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm a541196c25e7eab93b949a43349266ac907daf176103e627890b8dc6f3ad8693 subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm 173765bd35da01cbad3cba259410b0fe81e32cfe2efb3795e435403fdf4029e5 subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 48ebe5d4f06577192d72ae2e27637833b8d59fbc22d6187a37f29245f5ca38b7 subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 624080775aac60df5387c43149d9d74611de91f27c1002f0f1d9a2e49de7ad63 subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 82f30d61ad53ab64d99da2f405a5733954b087deb6a57f17d301e6f4ae565c71 RLSA-2022:4796 Important: nodejs:16 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * npm: npm ci succeeds when package-lock.json doesn't match package.json (CVE-2021-43616) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * npm: npm ci succeeds when package-lock.json doesn't match package.json (CVE-2021-43616) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2022:4798 Important: maven:3.5 security update The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__maven aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpm 645e5fcc65f5ce6a5e7c644af9aab686e5168eb67dfd41299b949b73980385fe apache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpm 9cf097d54e58ae1b8fd93d9b45f21f4af852b93f03e628386bcd0c88fc09745b apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpm 605d7fd276cc1605f057689518327458da2d3e3bbc9ca913a6c22523af7e05f7 apache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpm c150457c26d08f11ab2742a26b5603ac0421309db274d1fb9291609513952291 apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpm 0bec3fe86916400b445c090e2ac59fa15e67b85634d5d19db6be1bcfa35f53cc apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpm d1ce83ba6cb3e4a97216feb51b8f37d3bbd6d163343165ff58cc15cb5340f14a atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpm 860817f72225f53de2c34d05aec257a5d30619b2a66ac51d3e72c64b362a950b cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm e8d491fba0eb58a0c39d874c349f74791897d4081e994974882c75018a06fdb3 geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm 2816206b8a4525c74be3dd28945359d43c37633863851e98787e4c7785c009fc glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpm 17afe1f510bcc20dd864bd1d4ce9ef4ba137175ba3c1741f9006e00dbd48ec24 google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpm c8b1e0ebe1f806d22ee98e61211e3765171361d54c8aa43d237c47756d4413f3 guava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm e3dbd918aa5734109e5025fcff46aa6cd3a7d681c15b47b3839ccd014318b579 hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpm f9013313a092e35684dbfa9b11557e1603fe59feaa126da2cf2915c103413541 httpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm 7c7e53a1beada7fd2cfdae8f50acedd99d62bb3f92ee4cce8c7e8bd8e1e9f520 httpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm 6254441dd7d139fca7bf71c3efd602ae15c8d4ca4c448d26de3807a94f2250cd jansi-native-1.7-7.module+el8.3.0+133+b8b54b58.aarch64.rpm 5a7d8eb4d5ca317607691a7bb2c1cd86e8c42fc7c95f8af798b4698ab8648c9d jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm 493532237bdca6b7839c897c1a96cdbe6f954348baf86f9e61abaab5b1ce1b07 jcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm ec223715ffea5512ef05f8360522ec30d7052669260bb9c86ae92f6710aa4168 jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm d53adb7c5604a6c4b463fd8356426c62a0e287bbc2cfbae244eb30eb68ed108c maven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 8d0715634168a0feead5c2200b92f87700932e0482c656fd6d46804779e1cbf3 maven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpm 53d03a2e69c1418fda008f86abe12366522fc7db4a6460e02364f332f8aa78d5 maven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 15ca161ef8ce0b64553cc1e9a6c08c7c52233756722ab7b02b71443b22d76bb5 maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 183df0d4f71c063a2120049da9cf587068a3c4afd57f31edbdab23d2cd42f87b maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 72909fd412a649f39c80a3aeac0785ba97622f59d0c490f5784bea61d6f9f22e maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm 890e312f32d987ad806ead574436896a3fdb69cc4c701d10a8a5cdeed4f335f0 maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm d62eccdd6992ca5b358305ab16e27b68f98b9cf3b8b3d31b860dc1afe772d4c0 maven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm fe818f18b5bbfea7d1d477e35e8207ec850c4303dc4bdfd97f1c4fd5a788107c maven-shared-utils-3.2.1-0.2.module+el8.6.0+975+c0ed2db8.noarch.rpm bf6863b80c9ca556ea586da41e97507d8060bbcb55e29d709197c473079ceb7e maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 0348dc46c7235cbdb54e577a5c7e3bf67bf3990c5b5224da5a8dd810581b0aa9 maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 4c51162d25acfb25c357e2b78536d0439b499a894e89bd888970ae2ae7952e6b maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 7c235cf78744f6520a54c1ec8eea4e9f8adeb990d58958f07f1ffa16951fed0e maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm 97503c4b45752870defade5f80b65af78a64e63bdb7ec31c7131f9478aaedb0e plexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm 92f2c95dd389e6f28bdb5336069b9843e2d77e93561cd94114e795b648669963 plexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm 86ef908e4b8b5f6b75d79fb71c9e941d77070240f9f520da09a8f02f76d68c55 plexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm 4df6c9152b37c8c6f3242626c80b8138dbc2dcc2c16e362e6b7f9bd5fc011e1d plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpm ea5b1b2a881c5ae1c82442c1642dbd21de75bf72f84186f1a04e06af74491791 plexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpm 3b64df7a26462444ef46b693adf0d9d4aa4022a17cacc936d2a76fed0c9466b4 plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpm bd6542f8ea1aa47b0b5b280828f4828dada693a8ecfe1e9eb55a1ebc300f75ad sisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a417c7920d1c835b4342cf7f278800e79764ca5337c6d42e25e06f4484e6c98a sisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm a3be327bd921aab3011f3e1aa3639e45ef82c9fe97e29416851ef69300d9f4c4 rocky-linux-8-aarch64-appstream-rpms__scala jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm 71f32b6fe08073c78cb2584b57563d05c063c8dfc6a71be37f424c67daf95938 rocky-linux-8-aarch64-appstream-rpms__pki-deps slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a RLSA-2022:4797 Important: maven:3.6 security update The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__maven aopalliance-1.0-20.module+el8.6.0+844+4401f2ed.noarch.rpm 7eeaf0c0188fd7abfa376436127059874015019393e4235537d5e2ed45319091 apache-commons-cli-1.4-7.module+el8.6.0+844+4401f2ed.noarch.rpm d45eb25b1bdd3c4155de21484c812640c761efada5e3748ca7ee688f6e674bb8 apache-commons-codec-1.13-3.module+el8.6.0+844+4401f2ed.noarch.rpm aa5ee46b416414a3073e0350c7b26620248d0fa9e19afdfdd7130f51b67506a6 apache-commons-io-2.6-6.module+el8.6.0+844+4401f2ed.noarch.rpm c729f3415d9b7fe822d79ecd5458a7d2d8671b9e0c5d244961f0f2a9eb33e7cb apache-commons-lang3-3.9-4.module+el8.6.0+844+4401f2ed.noarch.rpm 5bee942196b9f2d665a6488f137a1fbf67658acaa8a0452866a13e39565c4fd8 atinject-1-31.20100611svn86.module+el8.6.0+844+4401f2ed.noarch.rpm 38a3b3be12cce2dd8a229a1b08ff8baf8937749e29398488454e924355709c04 cdi-api-2.0.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 1b8c51b541558fac6acb1a1fcf0bbf9f3e3b36bc5fd7fda183edf014814855f2 geronimo-annotation-1.0-26.module+el8.6.0+844+4401f2ed.noarch.rpm 9cd7fa9fcfea44d0f6e917c29e712b9056458593d4e747d711fdf3f325436cbb google-guice-4.2.2-4.module+el8.6.0+844+4401f2ed.noarch.rpm afa192d413ff1e04708c9f6ab8105505a47bf3e388f31cb60ede3c1b85d9d21e guava-28.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm f00da4db7f511d5004d2996736f0f6e925080b3c6661e2263c482312d56cefdb httpcomponents-client-4.5.10-4.module+el8.6.0+844+4401f2ed.noarch.rpm 2a57d054836c857182ff749dc7be558ee1a5f07b00522cae3cf3f3d87c914217 httpcomponents-core-4.4.12-3.module+el8.6.0+844+4401f2ed.noarch.rpm 0e1c866b9bec12ce3f220b25882f5f4bd490d3cde1b3645e91716110d1d554e8 jansi-1.18-4.module+el8.6.0+844+4401f2ed.noarch.rpm 72fddc86a6a7f038e78d5309045dde70b13392b5da09a702219553c0b53c5393 jcl-over-slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm 895e69759128994609537eddaaff6ba00d835ab844527cffaf90f992a3a50fbb jsoup-1.12.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 501286804b05968156d247358399bafb1ecd1bfa7ac6f3317b5204e5b0ae51c8 jsr-305-0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.noarch.rpm f36c920f44d45a0e7cfb7d7d21656cd9c46da22c7fe95b299251701719aeeeff maven-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 02dcbeb9256307b3d4e05b330cc1b19315500c03a4309b032db1a7ee3f4b5407 maven-lib-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm ece3ed809322707652d98d21a587efcda7cd2dd195adc5eac9000510ad645087 maven-openjdk11-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 312291f926d1ff4969ce01835823bbe596fa6eeb2f9d678e4855fdb051961d30 maven-openjdk17-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 41a59d80aa9b8b60c4c5e2daba8b2ebcc4ae6d33583379342ff21d924a0cfd88 maven-openjdk8-3.6.2-7.module+el8.6.0+976+839b99e9.noarch.rpm 93eeecde30df6567f71618ed96f9bda171f5a55ef954dd6506b467615e462913 maven-resolver-1.4.1-3.module+el8.6.0+844+4401f2ed.noarch.rpm 6214325a1453c46b242312e015b9056b0d1e9a20d74ddbfce8d4ea26d85bb0cf maven-shared-utils-3.2.1-0.5.module+el8.6.0+976+839b99e9.noarch.rpm ae89b917cc31af01690d60f23c069ed38738288b8301fedcea65ee53e9a4211c maven-wagon-3.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm 0dbb389e74b706ca34070bb1f947c41f0d9774fc24c54b7fc7023e8aff556f91 plexus-cipher-1.7-17.module+el8.6.0+844+4401f2ed.noarch.rpm 163f3e79b62989292a0aeb7b509afd09a930a6317b3c5c08a399e016c1cffe68 plexus-classworlds-2.6.0-4.module+el8.6.0+844+4401f2ed.noarch.rpm 01e99b3ff88442fc82db884984d27c14634349a172318bcfb2b20a16de84ccd0 plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+844+4401f2ed.noarch.rpm fd5a318d908a15a1fa1d7ff9c3df8b518bf7b27ff563dc8164bafe9b44e55f08 plexus-interpolation-1.26-3.module+el8.6.0+844+4401f2ed.noarch.rpm b3848083a273928462fa517f987208bc18d5610f525381b7eb98096452bc8c0e plexus-sec-dispatcher-1.4-29.module+el8.6.0+844+4401f2ed.noarch.rpm 93f53d423694b69f1f4bce0e002ae94c18d021bbdb8ffe67deead9a77af694de plexus-utils-3.3.0-3.module+el8.6.0+844+4401f2ed.noarch.rpm 7111d4b5a3f367990818f3af0e0f057abd25dcd60935ac096e3d68a3a3c669f5 sisu-0.3.4-2.module+el8.6.0+844+4401f2ed.noarch.rpm bc5e490cf81b850f58ee022ff6fbe8b759d51aa5e9f2382097927f0d70866caf slf4j-1.7.28-3.module+el8.6.0+844+4401f2ed.noarch.rpm c654a0e4437877c0193db1319fbb69a2cb2bb1cec2fac1c9274a4aaa9e45834a RLSA-2022:4805 Important: postgresql:10 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (10.21). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (10.21). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql postgresql-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 20ff6e91d07ab11d5e4004b80e6f2ba6bfdad74a8b836183268bc9ecf4cb82cc postgresql-contrib-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 6903e59c48b5c3228cffe305148806e734b25c4602a602b20778fda2c869a705 postgresql-docs-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 5ac5a8af4f55943c969f098cdc1ddd5cb20cdc437dfbb1c987cf4e075706492c postgresql-plperl-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm f7547430abdbaa1d9c00f1d1dec44f5ff2b2deec87331f98a6dfac2668bfe515 postgresql-plpython3-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 7f66d1dc03b32fe04ae8ecd887929267d1d7738015672ef5e75a7b3f65e6d859 postgresql-pltcl-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 99f0cfc6770d13c4d195086112be5756fb48235df5c125bf9aac81a6976eefa7 postgresql-server-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 091cfc42d76812e017a9dea41466587bdfec4be126b951d391fdb6510723743d postgresql-server-devel-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm c7583f6a3e92e4c6cf1db7a156c9b2205dee9898a5f458838726ce787a98b04d postgresql-static-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 4ecaa65b3c3ea8023b7a4311635fe2204eced51acaee8c97c6f7a171abe61c9c postgresql-test-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 4f553d97689eb83dc1347c27c523a7541a72bd3d05e8e9eb1ab7f7f0ca331b49 postgresql-test-rpm-macros-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 1dd0f6a9c34c6bc498ac1aed69531eb624f3a88625f5c61a14265bf7bae3f5f6 postgresql-upgrade-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 28eeae8be497967f63ce94de072d0384330ed5a6852c44b4d55e9920bde3b7e0 postgresql-upgrade-devel-10.21-2.module+el8.6.0+977+ab6e685c.aarch64.rpm 2fa87c4856f99f318b407ed86492f21205e445c37a51578f58d5d5471a8c275c RLSA-2022:4807 Important: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.11). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (12.11). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.aarch64.rpm df1a17426addbb4733fd9fab1f0fbbd4dd3f54ef0a1682538a6dd9d8d73d2b4f pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 RLSA-2022:4855 Important: postgresql:13 security update PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.aarch64.rpm f7bcd5a0f6740a069d1c012096b3edf2721720788607baf4ac42ac5e6d53995d pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 postgresql-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 9d530e42f5b962dd785f5ffe2b866e5a64bb996fb1bb49339685f5f719860dcb postgresql-contrib-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 5a0dcc104418f20b6605f22e46eb9b62dfc379d927df8eb357c52035495dc249 postgresql-docs-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 460fcceb93304146b3abfc2e1a7c8c572b60ec98653d7593d2081d795c449d2b postgresql-plperl-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 57532ec431685ae9b2220c40889b8ed399c3e939bbc4e91a0372ec5712eaac45 postgresql-plpython3-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 2a0ce895209d49ed8acc4fa9daee929513efd75faf21b0a0cf559e002f4a5e6b postgresql-pltcl-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 2ab442ee9a1fc39662b478f20a5f14c3cd836a3a2d869944835a9fcfa2d28d98 postgresql-server-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm e6822f4b1baaaacc0dbd14c2142ede9751d6468ebca2c5a5e6ea00a8eaf9dfef postgresql-server-devel-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm cd3560b594cff1622064374296b5ec9d099607894b532db8e4192ef1ff4ec288 postgresql-static-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 6b92c1c84512c792fb1aa32682ab8f48949e56d07b7b267072395158a5782e32 postgresql-test-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 3cbf3ac05d5a075619afb3b10ed3a3ab287c6ab538f013042ce8713e6c00d87c postgresql-test-rpm-macros-13.7-2.module+el8.6.0+980+9caa008a.noarch.rpm 13c1e52a8405f67103c08fecaecc5aa3e3929a055ddc44f4478cf2066c51b6cb postgresql-upgrade-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm 9d5dd31032e080c2b7128c077df38386e39e856b93cf3b055b369efab44c4300 postgresql-upgrade-devel-13.7-2.module+el8.6.0+980+9caa008a.aarch64.rpm aac799cfb6c09ea5bc1698014756d319d429fd65e9a9efdfc48bd61613d0859a RLSA-2022:4941 Important: subversion:1.14 security update Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 53355e93019a37210bf92863078a3b037ed999d2cab8caea12916fbb493a2d2f python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 812baa7d0c02e17c5af8e2692440f40eda8e513ae75e3d7f070e789c6a836550 subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 2fc884f159b7e5d388b84225b24c401213ad541f9a2a4f620e375505b2694902 subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm bb91d6b4c252c7cd1acb4dbd292abf00efd4a972945d6021fc2a65268d3d0634 subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 4a273a7e7dfd10ccf5d292721be2bf1b3d4eb906a0625f8a1cd75e6cbf39c3dd subversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm 911dd1adbc2b2cac43e6114aadfc7a825121a1e4211043c26c97549ab1495e75 subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 27bc8af5f90d033103b00d1bbe2b600acad0b46c750369c5dff894019af92e7b subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm dc4dcfc8bffc1f89629e7929492c5e7906bfa39dbe1d7d5c951a9f4881ed5c3a subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm b0d8c23c396ac5c2dbaeca3553fbc87205c4b8dbeff36038a06b4dc37f324df6 RLEA-2022:5139 nodejs:12 bug fix and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * nodejs:12/nodejs: rebase to last upstream release (BZ#2084651) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * nodejs:12/nodejs: rebase to last upstream release (BZ#2084651) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-12.22.12-1.module+el8.6.0+982+9fdca2d4.aarch64.rpm c493c6ae12a39204abadef0693c72b224567cc79a9a5738e54d6190ea605ff50 nodejs-devel-12.22.12-1.module+el8.6.0+982+9fdca2d4.aarch64.rpm 129a29d8f836010f499cc1a7733af811eb5b0444bab226192547bc479895322e nodejs-docs-12.22.12-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 6198e9169a86decacad936f3ceb4c2450717591622367d9718028aa44e938064 nodejs-full-i18n-12.22.12-1.module+el8.6.0+982+9fdca2d4.aarch64.rpm b2fa6c296af1a25ce5e3d56d6ba067eb2c9b92436e923eff3b250fb3eee1d905 nodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm 69c96c65ee3559a4996363d3b37b1f35e6a605cfa43c340ff2bbc544ef9977ba nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c npm-6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4.aarch64.rpm 723aa52e90792a3e28988d374b018a68040e2ccbf8fa95b0f9f94074abcabdc4 RLSA-2022:5163 Low: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy NULL pointer dereference (CVE-2020-13950) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy NULL pointer dereference (CVE-2020-13950) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__httpd mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm 9e61f8a994beaff9e74f4d92034eadaaefdb3eddc6f4916a41f4158ed613d6bf mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc RLBA-2022:5325 postgresql-odbc bug fix and enhancement update The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity). Bug Fix(es) and Enhancement(s): * postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postgresql-odbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The postgresql-odbc package includes the driver needed for applications to access a PostgreSQL system via ODBC (Open Database Connectivity). Bug Fix(es) and Enhancement(s): * postgresql-server-13 doesn't work with postgresql-odbc-10 (BZ#2080179) rocky-linux-8-aarch64-appstream-rpms postgresql-odbc-10.03.0000-3.el8_6.aarch64.rpm d8c7ee582c24b4fb09905ff91ec5b6bf5ea7e3ddf5af01956dc6f605c6d40e19 postgresql-odbc-tests-10.03.0000-3.el8_6.aarch64.rpm 204f707190b89afd484fcf0fb6725517447308cd443b28334216a85b6ebcf1ed RLSA-2022:5326 Low: compat-openssl10 security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries. Security Fix(es): * compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for compat-openssl10. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries. Security Fix(es): * compat-openssl10: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms compat-openssl10-1.0.2o-4.el8_6.aarch64.rpm 6a04b763d2f4bdcf1e4bad191b16158479155e676441fdc99aaec927c3703dc7 RLBA-2022:5329 cheese bug fix and enhancement update Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects. Bug Fix(es) and Enhancement(s): * [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cheese. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cheese is an application for taking pictures and videos from a webcam. It can apply graphical effects. Bug Fix(es) and Enhancement(s): * [DELL 8.6 BUG]non IR Camera is not the default device when open cheese (BZ#2072028) rocky-linux-8-aarch64-appstream-rpms cheese-libs-3.28.0-4.el8_6.aarch64.rpm 5b3116e02058a9f94239bbf55d21405496178c777787aa39b222da0ff8ef3b63 RLSA-2022:5331 Moderate: libinput security update libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libinput-1.16.3-3.el8_6.aarch64.rpm be78e53edf9ba8666802b546afebe5c5f49f95ee8e6470108450ddbafb280d42 libinput-utils-1.16.3-3.el8_6.aarch64.rpm 92ce48a821e2a3bae0db35310d092ba63523027b2a100e0e19e58264e74fa0d5 RLSA-2022:5338 Moderate: ruby:2.6 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374) Security Fix(es): * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.6.10). (BZ#2089374) Security Fix(es): * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby ruby-2.6.10-109.module+el8.6.0+988+8031c193.aarch64.rpm 7598ff80d410a0f23e06b91b74a8c647098fae8941ede8e598a0976fcf261405 ruby-devel-2.6.10-109.module+el8.6.0+988+8031c193.aarch64.rpm 9b35dc2338609c968d492a6cfd33a71389af4ee7da507eba8a7160f5a9c0d1fc ruby-doc-2.6.10-109.module+el8.6.0+988+8031c193.noarch.rpm 9d8843b155706338029b8ff3ac04785aac8213b5a79e2ed4ee003a95909a2a62 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bigdecimal-1.4.1-109.module+el8.6.0+988+8031c193.aarch64.rpm 47f31b9d5a54d3e7da6ee19c0e860c86eef4a9054692033a04bad0a52074d085 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bundler-1.17.2-109.module+el8.6.0+988+8031c193.noarch.rpm 314a44f0c44c7f8727ccd9fc45316c26e072302e5671e2dc845b25cc5b5d9fbd rubygem-did_you_mean-1.3.0-109.module+el8.6.0+988+8031c193.noarch.rpm ca729aa54be83479c4df5caeeda25008e6e80daed2ed60d7b410977fa2feb64d rubygem-io-console-0.4.7-109.module+el8.6.0+988+8031c193.aarch64.rpm 8919bbe5004509593f5dc5c4b4f3f6376461881dbe56d357fac8d4aa055cc7e1 rubygem-irb-1.0.0-109.module+el8.6.0+988+8031c193.noarch.rpm c9fc4170a5f613c975fef2607fa077aa227b8c417ba257e1ec09900fba95b757 rubygem-json-2.1.0-109.module+el8.6.0+988+8031c193.aarch64.rpm 1db5369a8aecafb3b22307fd351abbcff636f9e5f20acf699f6cc1e7c12d3df4 rubygem-minitest-5.11.3-109.module+el8.6.0+988+8031c193.noarch.rpm ed7fb2fc02330152e66a71076b3a24d830b27cbcd0b792d9fd4b7960cd882d1c rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.aarch64.rpm 3a517bbe26ade13a9b023fd013c0f7887633c4dabc04dd328edf37a7a2ded43a rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm 338c97faff784aa329359293a993af83bd5838c3cb571a9a79d777ebe802c197 rubygem-net-telnet-0.2.0-109.module+el8.6.0+988+8031c193.noarch.rpm 79a6b421c0f9cb9e060bb6e40e12edd46bb52a312f9921cd368989c28561a7a6 rubygem-openssl-2.1.2-109.module+el8.6.0+988+8031c193.aarch64.rpm fb56c994e9b4dad5a94959b9ef239b48533f59f8ff9807040e9b021cc7b173e4 rubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.aarch64.rpm fc764cf9237a3d754448a117e5c736df0ee282b2b04dc86b46672edfc8e14e3c rubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm 0d38f06f8d7babb231a0d9b19ae1c42e0bb25cad50442626c1ebf08e455f1372 rubygem-power_assert-1.1.3-109.module+el8.6.0+988+8031c193.noarch.rpm c84165bf53d6cd0bdba047786b91217c2f6ca8639566ed99a0a6bc37627ae4a3 rubygem-psych-3.1.0-109.module+el8.6.0+988+8031c193.aarch64.rpm 3c67e235fb4de483cd8f938c96ef485a90eed83efdf7759ce6ead64c3abe0bb6 rubygem-rake-12.3.3-109.module+el8.6.0+988+8031c193.noarch.rpm 4a45ad59ca4bd913c1e61aa1e9a8a9fc6fd239c162efbece0726593d270e0911 rubygem-rdoc-6.1.2.1-109.module+el8.6.0+988+8031c193.noarch.rpm 8d36041ac05e9f0cbe18cd425903a12368746681fcf6cc04146e04aad08dbff4 rubygems-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm 317ed3b2c5073ce0716025f4c43d611aaf0061c555f3bf701a531b0c6a10e893 rubygems-devel-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm 45b6e38e8e4165a994441054a1ce6223a9106dd561b97e2e09164bc5ee9188e5 rubygem-test-unit-3.2.9-109.module+el8.6.0+988+8031c193.noarch.rpm 65d84c800f67dfd01786d08e5734268cc8bf2688a0d4eef2846175b5185d7968 rubygem-xmlrpc-0.3.0-109.module+el8.6.0+988+8031c193.noarch.rpm 0114f18dc8974397c880851b63e25738ba31dbace6c3cf2fcc0a0ecc7bd83c5c ruby-libs-2.6.10-109.module+el8.6.0+988+8031c193.aarch64.rpm d3744136db75a1ba2e37d27ef91706d1ded7074ee1127180c6d1b02c588b0324 RLSA-2022:5467 Important: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac RLSA-2022:5468 Important: php:8.0 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm a05196d406c6018fdfbe6f70e2c016ddd81305ed02ec9966922cc91a01042fba libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f157c5b6ed5f6b65b73a42bb7cb94e92cfda9ba190ea707addd1299220f60547 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 983d3df277f937fed5b4afecbfa329f8e8d127f28f279a061dfedd80c7b5cbaf php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm dbc9d1a4dccce66ed75a1a3aa458dddc86d92baaba8cde6de288552accb7ede2 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 182ea4f209bee5fc3c099f0db4b68cf95083244cd7df9fb331be559a8ca6f0ad php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f70c1c86d7980dce552fddefdb2d1139da17ebe2b40705d25c26827eb6dee241 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 129f337de743773a02b9051d756f200659b1adf72890187215a6a69eea834ac6 php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm e211ce74e31de0df200fd0a71f228f576092c564bda558fe8d5c951794ac60dc RLSA-2022:5526 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.aarch64.rpm a4273c8250a4e1573877918e02f150b4d9759766a36388ed81bac5cea89327b3 RLSA-2022:5779 Moderate: ruby:2.5 security update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, rubygem-bundler, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby ruby-2.5.9-110.module+el8.6.0+992+fc951c18.aarch64.rpm 8c57a38a7178402d81cf7c09db8ff2166f6366d4e2be5909cc7289a3ecec3747 ruby-devel-2.5.9-110.module+el8.6.0+992+fc951c18.aarch64.rpm 7961d9a7d17b2c138abe927707ad24f4505b705e8c01c15b64d029bd073f7bb7 ruby-doc-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm 596396ef464cb584fbcfbcfedce7fb181a7edf989a25279d6605766a4defca8b rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 8f3ae24bd13476e23dda98793443bc37e5b6248daf59f00c501d022a18a6b587 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm 83442a220aed9378a9351d77b5ade81f061ef7a9aa9859cfe33b5f88995bcb57 rubygem-bigdecimal-1.3.4-110.module+el8.6.0+992+fc951c18.aarch64.rpm 646f28b4c9d73b3b86f1be0bb60e8112a66897d2b15288bd7bf35cc181b017fa rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 35b1eb070daa09c0d94dfb8309d9246462588237b6ad7d097d09c3ff407d096e rubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm 276974bce2b60db0a7af8e3c22f2ed904de58b105b059402ddb8011f5fde1cc4 rubygem-did_you_mean-1.2.0-110.module+el8.6.0+992+fc951c18.noarch.rpm 491c636d4f51e31158330ad61ceb6276fd981c445cb89c2f4d62c5553e27a61e rubygem-io-console-0.4.6-110.module+el8.6.0+992+fc951c18.aarch64.rpm 54dc4b82182e9147e03c870bda58770bece6037eaf83876bffb6c0d02c782ff5 rubygem-json-2.1.0-110.module+el8.6.0+992+fc951c18.aarch64.rpm 72b193441b8fee52bdce3e496d3ac0831fd08ac832b0c656cf8d4c37a6a2d9e4 rubygem-minitest-5.10.3-110.module+el8.6.0+992+fc951c18.noarch.rpm cae51d28a8aecd4d0367f6c9d4f150cced88a506b9c9e514a74ad6bce0399211 rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.aarch64.rpm d6e83db1ed53961b708866292cbcde971a111734e3b552032fcb204101e1dfdc rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm 43d24c8a0272d69370ed2ad69c60bce6dffc5fdac60549f8fa3c3373b8de7f92 rubygem-net-telnet-0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm 777398eda3736f19fd3f0dc05974980a2e181f5724125b572205c7a157b4e459 rubygem-openssl-2.1.2-110.module+el8.6.0+992+fc951c18.aarch64.rpm 54243599aa802698e1120377914dea3b38b57e0a0e5cc648f5a28633719f1d5d rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-power_assert-1.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm 82029ec23ba40ce9858ae97a06b22f1f119c4940f9a9af1505881a9bb5ad6d7d rubygem-psych-3.0.2-110.module+el8.6.0+992+fc951c18.aarch64.rpm fa81826aeaed2caf7d00f7dc9d2cb6861c5e0753037b872cd910b89137afaca4 rubygem-rake-12.3.3-110.module+el8.6.0+992+fc951c18.noarch.rpm 74c6e849df46135467e721faa7b1e77e2d8ea5665fc131700cb7ce3d51110dc0 rubygem-rdoc-6.0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm 6129045ecc2262ad1810376a02c3494b6a4a9a8d5c36277dba39c23f0ba04e4a rubygems-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm 1ed8de448e553d450c50b9b9d925349bacdd708c4840fa08be7af91d9e5f8f5d rubygems-devel-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm f19cf189dbb4d398d270ce6b7540cb3ece994eaacdd900be79a35e53865999de rubygem-test-unit-3.2.7-110.module+el8.6.0+992+fc951c18.noarch.rpm da1841c378881a90a4ea4c7ec8d19491a7ebfd49335e704e92c22724f5e426d4 rubygem-xmlrpc-0.3.0-110.module+el8.6.0+992+fc951c18.noarch.rpm 17dd4fdfa39afd9488c3620550b12ece5e1823503e4aad9a1e4ec19bbf592bed ruby-irb-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm 2a82dc891c1e41d6c9b8a02cae648259d2a140d3a33be70a3ba91eb916287f4a ruby-libs-2.5.9-110.module+el8.6.0+992+fc951c18.aarch64.rpm f60c5d33e51adc7bbade1300a99f222b5b19f1f0a210fbf0d398603051343fb6 RLSA-2022:5821 Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206) * QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207) * QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353) * QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103) * Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242) * Remove upstream-only devices from the qemu-kvm binary (BZ#2077928) * When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030) * Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415) Enhancement(s): * Allow memory prealloc from multiple threads (BZ#2075569) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow (CVE-2021-4206) * QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow (CVE-2021-4207) * QEMU: virtio-net: map leaking on error during receive (CVE-2022-26353) * QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak (CVE-2022-26354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux 9.0 guest with vsock device migration failed from Rocky Linux 9.0 > Rocky Linux 8.6 (BZ#2071103) * Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) (BZ#2072242) * Remove upstream-only devices from the qemu-kvm binary (BZ#2077928) * When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline. (BZ#2084030) * Virt-v2v can't convert Rocky Linux8.6 guest from VMware on Rocky Linux8.6 (BZ#2093415) Enhancement(s): * Allow memory prealloc from multiple threads (BZ#2075569) rocky-linux-8-aarch64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 54ac9d5ff7cfe04c8c978174304f3b769c6ebaffb5b4867452aaedb5bb405fe5 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 991c3ced4f9f62071fd55347b204cb02700ae6a92105be95b5cd7f8461084189 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.aarch64.rpm 9496f010dd51c309e35489e4b2b4eef9ca205efe10f699e727ebbb87f3216495 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 1d38a90c326e379f852440694d829d9df286e82f0aaaf7a20cf01a1dfd7253c2 libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm bc267e62ab3f58f101086759be4c2e23d04e1ad223dc3e5f9c3e612413663d4f libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm aa5c62e3fbf5ea23307d97e22527f643ceeb7a23ec6cffb8db277971bb87c570 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 857f74550b7100f3bbcb5838ebc3cb625b83804004286b1f4fd7c1b906d64b6f nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 7896e82315caee8ad9bd2644e530296ee622c2ddfae688248185723907e137a2 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 6f525884975cabd1580c6a8d697ccd8c045c659534a0c34c03968e9a21412908 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 8191bb3746b674453d36661d391b8c0e10a95f88c217921f9432d6b8a8bb6843 nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm f52b83ae63637c8b1e7315dfa0fe510aa51b78cc05ccd97b300434e0a28b0ea2 nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 1e49c7614560043aa959388f4518b2768e5425b8f9739ad1140006e3d655db8a nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 0aed2f62163a1ec150571397fd8d769bb51779ad3ef7fd52607a9757f0fd888d nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 766fceeadde01aee98d85e19c6277e616e069ace8b4c11779fdc56c79467bc2c nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 5b25ecac75ab91b2d379ded7bdbe88a94684e18f6061e7cfaed0ffb2946c6096 nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm ce3e3ee3844c0029598e80ba43fbe8f50c0cc992aec0e13d8c6637f171372f53 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d576ab4e2f4ffc7807d2cb0f6e2e25e87c236f476b1a78fa91a9e17f037da641 nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 452bfe16a3fa75235912bfa04b4f11556baee490f77e6321de7e153ac97a5fe8 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 94287915575db12bf71b263335af6131786ceb4b9b92e9c28fbbe8527c6946e6 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d16e4ac2b791ac7c9e318c529447913de8ca95449e1202c8cf32fcbc3cb397a0 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 916e69a5b2bcc4d8b0112922078774ffa5dfaf7f9973df775e1f5ef51b21b382 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 338678cc1b9159003aa7d2ea580f7d42e39a1e5ea2330a84878090fff1430425 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 3c0620998763169c5353c90923dda89dc3de31163c58f37c31baa00b2af81c22 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 39e68e387399720c563214f0b66f299572f479863300baf82e484bab46b46c9d perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.aarch64.rpm a142f30b346e5db77d4f5aa919920b3df24522a614c785efbc8a97df64ae5199 python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 3196143c842626a0a65c59ed1a7d1f7968fce62336a46d65ffaa996eaea74520 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 430e283968d39a981aac03c2c50e95f1adc9568bfed209ff0c948714a5a2710d ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 9779f9da2de53bef16886c338550c88e75f3ae8884abcb437e45472ff604ab92 RLBA-2022:5824 container-tools:rhel8 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594) * Work on container-tools for Rocky Linux8.7.0 (BZ#2087742) * Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968) * podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352) * ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049) * catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143) * symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627) * Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fixes: * error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data type (BZ#2079594) * Work on container-tools for Rocky Linux8.7.0 (BZ#2087742) * Backport podman's PR 14319 in Rocky Linux's podman 4.0 banch (BZ#2094968) * podman memory leak when using default events_logger configuration, and containers utilize healthchecks (BZ#2095352) * ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run command (BZ#2097049) * catatonit not found when starting pod (podman 4.0 under Rocky Linux 8.6) (BZ#2100143) * symlinks doesn't work on volumes under podman when SELINUX is enabled (BZ#2104627) * Podman does not detect volume from the volume plugin, unlike docker (BZ#2109295) rocky-linux-8-aarch64-appstream-rpms__container-tools aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.aarch64.rpm ad21091ede9d1a3c4e6c238cc75f608003b01cf8700469cc168e286fef20cc07 containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.aarch64.rpm e25d4aa99de7f0db48d671a34f066cb910e4569cd41c644125ec0de080b099ae containers-common-1-35.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 12f83e08d254c36cc3e092e5460706486a602489e77637532e458922a2009b90 crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 22b098f5278453b8bc2f7e9abcaeb06996ac1fdf8881e73a971721abdb8373e5 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 71a200046fa4f7b382711d1f72b5c03b083b837f039b998a1ebddec2a9bf255a python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 30313d29e17592d71da2f4779933f1dbf9b2adb048ae6b8d3053d93e069552f1 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 73cd6a5207f2527d63739b30acae92e0f1fe13a6889a7a677bb30891089c3e32 toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 918efe0ebc91b2be593ebd21bd4ab208d02fe9383aebe20f3dd02c5ba61cc1ef udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b RLSA-2022:5826 Moderate: mariadb:10.5 security, bug fix, and enhancement update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: crash at my_decimal::operator= (CVE-2022-27380) * mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Don't use less parallelism if not necessary (BZ#2096934) * Links in galera package description are bad (BZ#2096935) * [Tracker] Rebase to Galera 26.4.11 (BZ#2096936) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: crash at my_decimal::operator= (CVE-2022-27380) * mariadb: crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: crash in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Don't use less parallelism if not necessary (BZ#2096934) * Links in galera package description are bad (BZ#2096935) * [Tracker] Rebase to Galera 26.4.11 (BZ#2096936) rocky-linux-8-aarch64-appstream-rpms__mariadb galera-26.4.11-1.module+el8.6.0+995+5ac2a483.aarch64.rpm 603dafad8ad6259c53c870ee608b68f5d269f1a43e8a558c78f4ad50ba12904c Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a mariadb-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 5dad6e8c5f075ae526166e641ba94d3a4e860cefa87602fac261a6465f1285ce mariadb-backup-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 1be2aa3c5c510b4a5eb5381b26db4925e88966459fb5f242579790957ee88e50 mariadb-common-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 3dfb3b3a758b05141cfd7033ebe41ad4ff515d2f2a0b5226f5b527db99637604 mariadb-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 761b0125c5225349759a84c9504d2a9fbcd5bcac1e066c27ae71342fd3084566 mariadb-embedded-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 9f81db545acc139fa9df334b67a119bce33a385f29900bf333b2774568b3dda8 mariadb-embedded-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm a4530ec77ffc6eeeba0c9b5c6e5f53b24d65b78bd2180f9601838ea06bb7041d mariadb-errmsg-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 32e3a0f16358b9d741d18f17c8be7704921c21a1da53c6dcf4013bc5554d734e mariadb-gssapi-server-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 1da3bbe716d96e5b1a77df59a81bad1e9b87e03aeb82a317633d7683d55547af mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 70b3ba1540e533c86a715d0386e7b7418905f0d0d455843c90befe3716134c0a mariadb-pam-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm da8dcdf8c4eb68c8b7a300b89dd8f6962532f2167be23a12394e46b042bdb711 mariadb-server-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm b3934016187182dacd357392cbc95d8a72292a0aa48eb103d340de2a9bc1263f mariadb-server-galera-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm c42a6981acbcd4ee1ed6545423ff28f91da1f04cd75726f68bd6f1a955a5906f mariadb-server-utils-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 603ffe59c81845f527b07d7e92a8f1586dbce752ee485ce8b9e73b8e9bebc1e6 mariadb-test-10.5.16-2.module+el8.6.0+995+5ac2a483.aarch64.rpm 4ea15ae304a631dec778b323e52e720c903f9c53d4ff85838b30906b573be8b4 RLSA-2022:6158 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac RLEA-2022:6440 nss and nspr bug fix and enhancement update Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062) * Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097900) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641) * allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642) * Need to be able to run self-tests at will programmatically (BZ#2099759) * NSS segfaults still in client auth path. (BZ#2105007) * ipsec --initnss timeouts probably due to entropy. (BZ#2121486) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nspr, nss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR (BZ#2093062) * Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [Rocky Linux-8.7] (BZ#2094470) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097900) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (BZ#2098641) * allow signature verification using RSA keys <2k in FIPS mode [Rocky Linux-8.7.0] (BZ#2098642) * Need to be able to run self-tests at will programmatically (BZ#2099759) * NSS segfaults still in client auth path. (BZ#2105007) * ipsec --initnss timeouts probably due to entropy. (BZ#2121486) rocky-linux-8-aarch64-appstream-rpms nss-3.79.0-10.el8_6.aarch64.rpm c22c7934bdfd0d2b49a782ed5e00d16de444787e54f5567dddbbefcaa8ff7e99 nspr-devel-4.34.0-3.el8_6.aarch64.rpm 51605a6e5fb52c4fe8c3b24c21e2f1b4abfb338fb86f6b6c9af97258bf91501f nspr-4.34.0-3.el8_6.aarch64.rpm 61b7ad4b7dc181b6df6e547241444d478683bfc0703f75a113a515ae35b1d43c nss-devel-3.79.0-10.el8_6.aarch64.rpm 016b9045d02a51b5ed97c82d3473ed0aa3ebcf7ffb6864b40677a69b5dfa322d nss-softokn-3.79.0-10.el8_6.aarch64.rpm 9621982403b95d5bd6c330b997a5f2aadc37ed6c46b9afa8a1fad456f8098598 nss-softokn-devel-3.79.0-10.el8_6.aarch64.rpm 8c6639e28818de0239d16185a5ce0ec8a5479c38aadd6968490ffbfc5d0bde1b nss-softokn-freebl-3.79.0-10.el8_6.aarch64.rpm ac0960c2e5fea917220f47552c7cc7cf059d8fe5fae0ad5c8c0bf194dbdd183e nss-softokn-freebl-devel-3.79.0-10.el8_6.aarch64.rpm e0cfa85718bd199b1c3ad1616e0d7c994ee7dc2532a980a961e4184a1a9bd6f1 nss-sysinit-3.79.0-10.el8_6.aarch64.rpm 73bec1538cfec5b76e971c93de2ad6d6ab526640b7291f5f718b5ec6020690ea nss-tools-3.79.0-10.el8_6.aarch64.rpm a83464a1292dabb9ba2a9afb03a9d9edf5bfacf344223a0dd1c683f90779e8f0 nss-util-3.79.0-10.el8_6.aarch64.rpm e68e7aa46c6fa50f74018963604ab1e492a445f2f984ca820de01bec921aca55 nss-util-devel-3.79.0-10.el8_6.aarch64.rpm 23529117666f561793b8114129c27914782a541418509be1c4c576c98195bdc3 RLBA-2022:6441 mysql-selinux bug fix and enhancement update mysql-selinux package holds SELinux rules for the mariadb and mysql modules. Bug Fix(es) and Enhancement(s): * SELinux is preventing wsrep_sst_rsync getattr of /usr/bin/hostname (BZ#2096279) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mysql-selinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list mysql-selinux package holds SELinux rules for the mariadb and mysql modules. Bug Fix(es) and Enhancement(s): * SELinux is preventing wsrep_sst_rsync getattr of /usr/bin/hostname (BZ#2096279) rocky-linux-8-aarch64-appstream-rpms mysql-selinux-1.0.5-1.el8_6.noarch.rpm 59f929c5d0c2e7f3f7e230d6eb9b0c9b13acf9642e4480b4337af56cf8b336fe RLSA-2022:6443 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083) * mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085) * mariadb: server crash in Item_args::walk_args (CVE-2022-32087) * mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for Judy, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.35), galera (25.3.35). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT storage engine heap-based buffer overflow (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: server crash at Item_subselect::init_expr_cache_tracker (CVE-2022-32083) * mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor (CVE-2022-32085) * mariadb: server crash in Item_args::walk_args (CVE-2022-32087) * mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort (CVE-2022-32088) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [Tracker] Rebase to Galera 25.3.35 for MariaDB-10.3 (BZ#2107075) rocky-linux-8-aarch64-appstream-rpms__mariadb galera-25.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm d356561583e31333d770ad46122e61179259edee761eea5981763cf54135f380 Judy-1.0.5-18.module+el8.4.0+427+adf35707.aarch64.rpm c01cf388eb9a04e86d72cce82f3177756c2c89fa3acae81c69b59c45a2bbd89a mariadb-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm 3927c9c5320407900214bf66413aa3320e538396e8392509797009adfc858b88 mariadb-backup-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm d9ea33ea69584deb2e0f18bbc76afeb915fff53a36935533790301168a6eb3b8 mariadb-common-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm c8800798de6e417d60d6bd7f836297fc5f4d3a03189752896313ce8d6952cf53 mariadb-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm 3bd94ba96ddd885d78703596b4468a60c739d847883fd39706a18057a5efe18c mariadb-embedded-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm c48735044ecef0126f53e1089438283326fb8a9775d0ad2981dc72d13f77ba16 mariadb-embedded-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm 50d7b1ebd3aac2c8571a521ec11a11e068c695d82e9872b2ed20f39bb8f4a42d mariadb-errmsg-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm 2fe39b1a9163ec2c9acfa8f3a59e0b4cb9e73d3a6ee4549c8a0695a8998a71f7 mariadb-gssapi-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm c2b3b9ecfd0c17fd04fb2244032e6a463aac6fab10f12eca32162a92507d6a24 mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm 6dbe315bd6012b90cf83d0657722412ec6662ff424d0149cf02ea574fd32f52f mariadb-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm c999d17265f691c1c895380458a4cb4a857fd1caa41fc80dccb58b4091bf2251 mariadb-server-galera-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm cb1e67a682024f84f51542cf3116b0e7d10547d03bedcbd06f157f11ed8ffd14 mariadb-server-utils-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm 7afe97a174947a67f201e08aaf72d25ff63454498981379ceee8fa29334024ed mariadb-test-10.3.35-1.module+el8.6.0+1005+cdf19c22.aarch64.rpm 5e446ddf623a5f8d225a273793a315da6177093d388362ce18204fbd4eb965fc RLBA-2022:6446 virt:rhel and virt-devel:rhel bug fix and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568) * swtpm_localca: Test for available issuercert before creating CA (BZ#2109987) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * swtpm: Disable OpenSSL FIPS mode to avoid libtpms failures (BZ#2109568) * swtpm_localca: Test for available issuercert before creating CA (BZ#2109987) rocky-linux-8-aarch64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 54ac9d5ff7cfe04c8c978174304f3b769c6ebaffb5b4867452aaedb5bb405fe5 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 991c3ced4f9f62071fd55347b204cb02700ae6a92105be95b5cd7f8461084189 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.aarch64.rpm 9496f010dd51c309e35489e4b2b4eef9ca205efe10f699e727ebbb87f3216495 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 1d38a90c326e379f852440694d829d9df286e82f0aaaf7a20cf01a1dfd7253c2 libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm bc267e62ab3f58f101086759be4c2e23d04e1ad223dc3e5f9c3e612413663d4f libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm aa5c62e3fbf5ea23307d97e22527f643ceeb7a23ec6cffb8db277971bb87c570 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 857f74550b7100f3bbcb5838ebc3cb625b83804004286b1f4fd7c1b906d64b6f nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 7896e82315caee8ad9bd2644e530296ee622c2ddfae688248185723907e137a2 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 6f525884975cabd1580c6a8d697ccd8c045c659534a0c34c03968e9a21412908 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 8191bb3746b674453d36661d391b8c0e10a95f88c217921f9432d6b8a8bb6843 nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm f52b83ae63637c8b1e7315dfa0fe510aa51b78cc05ccd97b300434e0a28b0ea2 nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 1e49c7614560043aa959388f4518b2768e5425b8f9739ad1140006e3d655db8a nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 0aed2f62163a1ec150571397fd8d769bb51779ad3ef7fd52607a9757f0fd888d nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 766fceeadde01aee98d85e19c6277e616e069ace8b4c11779fdc56c79467bc2c nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 5b25ecac75ab91b2d379ded7bdbe88a94684e18f6061e7cfaed0ffb2946c6096 nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm ce3e3ee3844c0029598e80ba43fbe8f50c0cc992aec0e13d8c6637f171372f53 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d576ab4e2f4ffc7807d2cb0f6e2e25e87c236f476b1a78fa91a9e17f037da641 nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 452bfe16a3fa75235912bfa04b4f11556baee490f77e6321de7e153ac97a5fe8 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 94287915575db12bf71b263335af6131786ceb4b9b92e9c28fbbe8527c6946e6 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d16e4ac2b791ac7c9e318c529447913de8ca95449e1202c8cf32fcbc3cb397a0 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 916e69a5b2bcc4d8b0112922078774ffa5dfaf7f9973df775e1f5ef51b21b382 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 338678cc1b9159003aa7d2ea580f7d42e39a1e5ea2330a84878090fff1430425 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 3c0620998763169c5353c90923dda89dc3de31163c58f37c31baa00b2af81c22 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 39e68e387399720c563214f0b66f299572f479863300baf82e484bab46b46c9d perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.aarch64.rpm a142f30b346e5db77d4f5aa919920b3df24522a614c785efbc8a97df64ae5199 python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 3196143c842626a0a65c59ed1a7d1f7968fce62336a46d65ffaa996eaea74520 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 430e283968d39a981aac03c2c50e95f1adc9568bfed209ff0c948714a5a2710d ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 9779f9da2de53bef16886c338550c88e75f3ae8884abcb437e45472ff604ab92 RLSA-2022:6447 Moderate: ruby:2.7 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-bson, rubygem-mysql2, ruby, rubygem-mongo, rubygem-pg, rubygem-abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (2.7.6). (BZ#2109424) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__ruby ruby-2.7.6-138.module+el8.6.0+1001+b5678180.aarch64.rpm e26832334f76948c23f0f1376ca2892473cf08f758e30548aeb35e0a45238b48 ruby-default-gems-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 946f3f97abe1043baeb20c0a8ec924bc61b0e49291b0268f1ad9ebb63a1109dd ruby-devel-2.7.6-138.module+el8.6.0+1001+b5678180.aarch64.rpm 5ceee1405cb88d0e679ac5ea0729b812405c108b39a921b9eb690c518a044559 ruby-doc-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 579c36711696058bd856ded4f64cb5fcf503f3ae8644ba42de9ddfa48ac5ba7f rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bigdecimal-2.0.0-138.module+el8.6.0+1001+b5678180.aarch64.rpm 6966261aa219a7d27107e4db32ad793a89575088a5a6344549afdab28e1aef6b rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.aarch64.rpm 796c11f0cc7e0d6bff9568c0c195c276755a3acf101e7c7bc95d5ffdfba8e112 rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-bundler-2.2.24-138.module+el8.6.0+1001+b5678180.noarch.rpm 3fc4e371da55358a09ea6f0e5b6ed0dfcc5b60eea88257064740becf88e85887 rubygem-io-console-0.5.6-138.module+el8.6.0+1001+b5678180.aarch64.rpm 7d1b0e91993d8f467f3c85f1e5252d5468342a6b76be4a6665b475b4f2f14cf6 rubygem-irb-1.2.6-138.module+el8.6.0+1001+b5678180.noarch.rpm f5de4c68458146f77746b2c54f1d3511db9649247a0509b93fc405c90043e94e rubygem-json-2.3.0-138.module+el8.6.0+1001+b5678180.aarch64.rpm 34acfdf48daaed0ce22247a89bb4c7e26a47c0a7826f6dae1cf81827442ac1d8 rubygem-minitest-5.13.0-138.module+el8.6.0+1001+b5678180.noarch.rpm 07ea22986bb44e59e068d3072dff2c0e00283df3c9200797e73bf0b79bf25c0b rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.aarch64.rpm dd693d8e37d6dde4f0d72425e0a1dd38ec56c0cba528097859af7fc42c5ea0ec rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-net-telnet-0.2.0-138.module+el8.6.0+1001+b5678180.noarch.rpm c822b6dc4af76f61345acd67c7fef17fe33f713721e4777066455b87987488a3 rubygem-openssl-2.1.3-138.module+el8.6.0+1001+b5678180.aarch64.rpm 7bab77d74a9ee07b10fb753042e9b899090fddf1109145a4ff4ddc8f84e8ac0e rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.aarch64.rpm 843fe8913c91ea33e7f5020c1a6e6a79b56ae281825b4be911cb6a456332704a rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 rubygem-power_assert-1.1.7-138.module+el8.6.0+1001+b5678180.noarch.rpm b209c9c0c9b782f49af94fa2235e2cd1c3cb29cbcac5feaf2cbd59f2abcf7488 rubygem-psych-3.1.0-138.module+el8.6.0+1001+b5678180.aarch64.rpm e69feba6bfdaebd95e9a748191e9916da5a4ad330393e9f40992d084c3fb8a43 rubygem-rake-13.0.1-138.module+el8.6.0+1001+b5678180.noarch.rpm 0ac0cb168c5a0622b166259c5f0fdf19d0fe017d5f582db1dfb5925972eca0f2 rubygem-rdoc-6.2.1.1-138.module+el8.6.0+1001+b5678180.noarch.rpm c65ba40b347f7a15e64b79f71b1f1c8835be2c743e236142ac990d0682b06d35 rubygems-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 388bdcba6820a3d09cda706b4296a1126cbbd464f7c8097390bc9b2675ded729 rubygems-devel-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm 7abd21c3882e5a577f6ebeef3c69598734c4b87c35e19b5bb7177383dec65f36 rubygem-test-unit-3.3.4-138.module+el8.6.0+1001+b5678180.noarch.rpm 913327e6b26f845a37ce3de81c1f00bd3141cba563c1bc82dc2ec347121b1595 rubygem-xmlrpc-0.3.0-138.module+el8.6.0+1001+b5678180.noarch.rpm 3fa5f6aaa2d8e47f2c6a76037399c71a2f53bbbed10f29c15c0adaddbc186bc2 ruby-libs-2.7.6-138.module+el8.6.0+1001+b5678180.aarch64.rpm 341cb62d55928935f2f8a10152c22e21834cf042dce1af25b7059d401c71eced RLSA-2022:6448 Moderate: nodejs:14 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: rebase to latest upstream release (BZ#2106367) * nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111417) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:14/nodejs: rebase to latest upstream release (BZ#2106367) * nodejs:14/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111417) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c RLSA-2022:6449 Moderate: nodejs:16 security and bug fix update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: rebase to latest upstream release (BZ#2106369) * nodejs:16/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111416) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: rebase to latest upstream release (BZ#2106369) * nodejs:16/nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2111416) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 RLSA-2022:6450 Moderate: ruby:3.0 security, bug fix, and enhancement update Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109431) Security Fix(es): * ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817) * ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819) * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * ruby 3.0: User-installed rubygems plugins are not being loaded [Rocky Linux8] (BZ#2110981) rocky-linux-8-aarch64-appstream-rpms__ruby ruby-3.0.4-141.module+el8.6.0+1002+a7dba0ac.aarch64.rpm 6216ec5cb8942fec47736cc995daf40af543f372070768eca1f1bfb79ae158d3 ruby-default-gems-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm dc9d3a0c9c2b36bc932f04775c2f0f8c0ef8e75d59a1203cddc700a70ce0f8dd ruby-devel-3.0.4-141.module+el8.6.0+1002+a7dba0ac.aarch64.rpm 93ef7ffee9260caec7d829fc3a8ebcb77325463eb74e43b3e73dc0791002c0b8 ruby-doc-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 43540d116659edddd917d22fa0468970468178d21c225cbce37ccb207fd9f1fb rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bigdecimal-3.0.0-141.module+el8.6.0+1002+a7dba0ac.aarch64.rpm 59253302b548d7e9ffe316aec7cff99ffb4d4b1c56b64a378e2c3e60bd073403 rubygem-bundler-2.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 8eb2699d7f285d95fe6620e522faa03e3bccdd4f34f81a091294612c26fcc9bb rubygem-io-console-0.5.7-141.module+el8.6.0+1002+a7dba0ac.aarch64.rpm b554587920d058f4ff4500577edb7c5a9141537b8c1e09cdf526ed8c955b19b7 rubygem-irb-1.3.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 334a45559b587fe68d4eb23511b62e0ad19ada521550c50448dede37a502b858 rubygem-json-2.5.1-141.module+el8.6.0+1002+a7dba0ac.aarch64.rpm 02a6d56339a5372ae4f2b39a7dbc7451f3775a7d93731143a86df0c253ac370d rubygem-minitest-5.14.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 7acb747859c30449778b99e104991d63a9270383936d6613bf32be8837924930 rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.aarch64.rpm dd693d8e37d6dde4f0d72425e0a1dd38ec56c0cba528097859af7fc42c5ea0ec rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm 5d8a6ae21498d5aa74641225afa1f77a5bf0045619e460655e3bc36742355e62 rubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.aarch64.rpm 843fe8913c91ea33e7f5020c1a6e6a79b56ae281825b4be911cb6a456332704a rubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm a0fae40c6402b842e57c550473b40e02370df604645e04d57a2d564c58580822 rubygem-power_assert-1.2.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm b2e4a37abf7b0ec0df7a6315db2dca68a6382c3e63049a66bb04c14f92330c63 rubygem-psych-3.3.2-141.module+el8.6.0+1002+a7dba0ac.aarch64.rpm 8a0a4d24c07daa68d96f16df3cc9626ffa91d8306aac0b2b47c9bc1ecf4fe474 rubygem-rake-13.0.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm d9c7648331983866cc292dccd017cb1fca53c7a4974e94a51f83de2b96cd18ab rubygem-rbs-1.4.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 9f6486e3d4a1d97f6059efda9f9fd5f04a82c4a141419f317cd6874aebbd083e rubygem-rdoc-6.3.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 16b71eaa43c10307c0c031c45538e10453b6f3fc2bf21445fd969eb6f60510a3 rubygem-rexml-3.2.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm b75400368159fdfc472506e2349144e2dd835ccce2b4a5c7daa49a64107f62be rubygem-rss-0.2.9-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 8f8cd7c715414e63daf97a96c85d5d4dba978d2c9974ecd97d84c237bf53b3fe rubygems-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 195c1695785aaf28fb450939123d768c9065fa86a85e3565c113f7ea7911b947 rubygems-devel-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 1af10623a7e05ff1b31948e1db26e2dfc864a368f6a8d6db8a5ed34919beca44 rubygem-test-unit-3.3.7-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm 999ea750ec5c45ca913edc583a4b89d9f648e9773099466358204994a51df7fb rubygem-typeprof-0.15.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm ce4fd4cf9bd56646a479b69a6c98f95c5f3a402639b33b0766464d830a080373 ruby-libs-3.0.4-141.module+el8.6.0+1002+a7dba0ac.aarch64.rpm 8dc676d6f02ccd207f8886fcafb486a1f7207430062e06ae4f0bb436c14b3ee2 RLEA-2022:6453 container-tools:3.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120558) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120558) rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 crun-0.18-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 912586617853c37e9ddf8b951bd72f35172fe0452673b4a771ea9ab9cfde74c8 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c8bce58bb8faf13610b8212a0398a606c723903d32cdd511d125a492d5140f26 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.aarch64.rpm d265cd7a3d56fd2b95918ff1066f55d950833d6fbe7766873f7e4ead8d3b3fbd slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm a5b2c9bf2a92f9533b194472cf1d4a729879513b4796d3720b9ff97def54fec8 toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm ab2e6b9be7a0095f0c39f4b8da200833996f5c78628b8b7f3c3de1aeef9a6e37 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLEA-2022:6454 container-tools:4.0 bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120561) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Module meta data is wrong (BZ#2120561) rocky-linux-8-aarch64-appstream-rpms__container-tools crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4395c56a677e11bf57b7c1627060cbeb814ae1dcf5948580ab371593f6494502 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLEA-2022:6456 gnome-settings-daemon bug fix and enhancement update The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail. (BZ#2122964) rocky-linux-8-aarch64-appstream-rpms gnome-settings-daemon-3.32.0-16.el8_6.1.aarch64.rpm 412d59e74df9a3b02f9d0d4dd6064efe40a461791a7770ba873734e98f58bb8f RLSA-2022:6540 Moderate: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms webkit2gtk3-devel-2.36.7-1.el8_6.aarch64.rpm 4fad8d7d372e24cb26ebe940a64ef947f82f11bc4d836d66a3d8bd207bf541ee webkit2gtk3-2.36.7-1.el8_6.aarch64.rpm 4a5a67f966a3d3d81075bdb5bbf0c0129e58f5ee9a2e09efc41669eeb5f5d0e0 webkit2gtk3-jsc-2.36.7-1.el8_6.aarch64.rpm 8a8f5ba335344ac8b68567c1696e92308461a9d52325abb42428cf3fb8ccad98 webkit2gtk3-jsc-devel-2.36.7-1.el8_6.aarch64.rpm f307c0414d165516239e2acc281a2eeb57877c06a5b8f55800719563922699c8 RLSA-2022:6542 Moderate: php:7.4 security update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac RLSA-2022:6775 Important: squid:4 security update Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for squid, libecap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__squid libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.aarch64.rpm a4273c8250a4e1573877918e02f150b4d9759766a36388ed81bac5cea89327b3 RLSA-2022:6820 Moderate: prometheus-jmx-exporter security update Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for prometheus-jmx-exporter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpm 85d52b6eb723113b6ba471b2ca26afae713997a89616d57739e7498226fdac71 prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpm 764abbe69bd693ff8794e3c9fa5fd5b609be9ba1e896ba02ed4476d2efb61dcc prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpm b252c5787fa070f1cad64f473a492dbbc981882ac49570b9a1b5b5bb9596a7a8 prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpm e747522630dfee8d219dbd8794386cd774564f4cdd5b688d3e4ee255c217d91f RLSA-2022:6911 Moderate: .NET 6.0 security and bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-6.0-6.0.10-1.el8_6.aarch64.rpm cbd2c759742626b0f906307f1e537900f3318b01b7934950eeafc991594ab594 aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6.aarch64.rpm c6b01dc0a436fd3c26d247be36f32e372093d5c53ae92eb59239b2320cf0b3d1 dotnet-apphost-pack-6.0-6.0.10-1.el8_6.aarch64.rpm aa16a956c91f6d1759795d8a8ba1b505d760c1f13f8f4255b290a4ff178b55b0 dotnet-hostfxr-6.0-6.0.10-1.el8_6.aarch64.rpm 674a4f5d02d4cb8d959e733530aedce02feb20b37e87feba1eff225900248349 dotnet-runtime-6.0-6.0.10-1.el8_6.aarch64.rpm ecb9ff685ed4e0705645219999996c0818979edb1e7e0dc5e726c219da137b84 dotnet-sdk-6.0-6.0.110-1.el8_6.aarch64.rpm 620dda09de98b742ab46fcb16c657ec0d4e4bd2e3417da8dc78ddbbed3e1f2a4 dotnet-targeting-pack-6.0-6.0.10-1.el8_6.aarch64.rpm 87eef02924903dcbfcc26d2ece6683617671bc303a530ed9d263d1c6fbac9434 dotnet-templates-6.0-6.0.110-1.el8_6.aarch64.rpm 30f4edefd54a9f208bc875c8477d0040e035fc0f2de51d5ca4b5a9c55bbe93d8 RLSA-2022:6964 Important: nodejs:16 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs 16. Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs 16. Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-16.17.1-1.module+el8.6.0+1046+80feca58.aarch64.rpm 52cdd310a29327e9ea0460d53df5c9c650cc212055989761bc45b6459f0e4d1a nodejs-devel-16.17.1-1.module+el8.6.0+1046+80feca58.aarch64.rpm 16acc96269cdaeb3673773539137e793d1f0567c5e1d386c93a0e2d56651b173 nodejs-docs-16.17.1-1.module+el8.6.0+1046+80feca58.noarch.rpm fb53065a9e4d209cf205a7183c933faefa9e67f22581cc3ad291c2fd93edd5d5 nodejs-full-i18n-16.17.1-1.module+el8.6.0+1046+80feca58.aarch64.rpm 0e35a21e6694e4ee6552076b51eccdaee532f1b0af460b8a3084b224cb73f929 nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 npm-8.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca58.aarch64.rpm 5074ff8e9726009738908687abad7605fc4da9f579fa560253baa0c9ffac5833 RLSA-2022:7006 Moderate: java-1.8.0-openjdk security update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.aarch64.rpm 7ce2d03cd20aeb4037864a887682c387e2a4bcc64ae26f26f2ab0b6837f47bbb java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.aarch64.rpm 9cbbbb4f6fa75383898eefda3ea318d11680cf24e5cf79f078c81994c677b4f1 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.aarch64.rpm 14bcac44131db59636eed4dc9a390bd12ea598c93e793f93cc132c904c1815a7 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.aarch64.rpm 58839c66dcb40133472e02900acead6bc401fc31ed6f3385b00fb615bd58e147 java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.aarch64.rpm 44857f2bc052d42665e382d9a9d9175c3cbcd7c0b0b91c496d23e9b192c960af java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm f17b77d4203cf1a819eb288008fd2080959d7dbfd894ecef89d69f0e0d023e4e java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm 762991fd798dc9d95f9e2257ebde37ffd259e56d3bffb2c9c1a89fd16d523079 java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.aarch64.rpm 0380ccc8924cbf74181e32a3ec40e7e4acfe0ec967751b823a1e5950205ffbec RLSA-2022:7000 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) rocky-linux-8-aarch64-appstream-rpms java-17-openjdk-17.0.5.0.8-2.el8_6.aarch64.rpm 704566b8dc14ccb0b9df79829eb9309de9825485c4b697e361072c573da424c6 java-17-openjdk-demo-17.0.5.0.8-2.el8_6.aarch64.rpm 70985f575840d5a05164675dff0e1ff1bad4a711e783283f29d22f3d02a9f5ad java-17-openjdk-devel-17.0.5.0.8-2.el8_6.aarch64.rpm 7a2b5bc0f7d90775a62d42aadeb0c5b41aab9d28fb8e093ad18514dc6277f21b java-17-openjdk-headless-17.0.5.0.8-2.el8_6.aarch64.rpm c33bd2ed0a900944a9ae9e274e0a483c9471640368371dddd948aa7f93f19a11 java-17-openjdk-javadoc-17.0.5.0.8-2.el8_6.aarch64.rpm 07b8e4750e1235b4d17d0ab9e1be0f7ebc7b9028c13fe6620a8a39a3822161ad java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6.aarch64.rpm dd0cc7035450869b236083c5f14aed7eaf9c12e2cb845f4ea2b7965c9d871f7f java-17-openjdk-jmods-17.0.5.0.8-2.el8_6.aarch64.rpm dc5736075496a0f587240e1ad5e5afa971c2f63d00eeae614b876646d28ecd2a java-17-openjdk-src-17.0.5.0.8-2.el8_6.aarch64.rpm fd1e82a0841f34ee4390892537caf92352e5407b00507f1e8e531a11d8f2a9ee java-17-openjdk-static-libs-17.0.5.0.8-2.el8_6.aarch64.rpm ac98ee81cf0e2ed15937a03fcf6e8d2f0b688eba718d0781f9a4bac6ce23d180 RLSA-2022:7012 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) rocky-linux-8-aarch64-appstream-rpms java-11-openjdk-11.0.17.0.8-2.el8_6.aarch64.rpm 82762dd1c974f9e5ccbfae0ca6141485e829da63d9e1c071fadaf4ab4fae1d18 java-11-openjdk-demo-11.0.17.0.8-2.el8_6.aarch64.rpm 848cb6fc2f30dda838015f76984bb6ff09cf5b102b2a7d1c49bc21a9db7ab44f java-11-openjdk-devel-11.0.17.0.8-2.el8_6.aarch64.rpm dc7319eab35d612e9037ca65e045907d1f85622aaac8b61ac29f5cc151f545ca java-11-openjdk-headless-11.0.17.0.8-2.el8_6.aarch64.rpm 8555d56781b12d2dd6545b091b818b46ea597da8beebcb8a1473f8a18e996db4 java-11-openjdk-javadoc-11.0.17.0.8-2.el8_6.aarch64.rpm c95b01856480ccab06d858708e12a1e506d2b72588551a258e5c127528f608a3 java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6.aarch64.rpm 0a346e6c570882bd69e6d72b8b90b7e35ac6e6f3e202d251af756b4deaffe189 java-11-openjdk-jmods-11.0.17.0.8-2.el8_6.aarch64.rpm 745d345298a37faba6695d4a5133f21b4459533a2e37f4cfb445ddd02fb689dd java-11-openjdk-src-11.0.17.0.8-2.el8_6.aarch64.rpm a63d229aaf342c84802ac104985078ca0d0619ea1fa6357739652f643c1b129d java-11-openjdk-static-libs-11.0.17.0.8-2.el8_6.aarch64.rpm a5c2dfb8a98cf9dffff652460750790f825c3cea2047ce657886a76a1226b74c RLSA-2022:7119 Moderate: mysql:8.0 security, bug fix, and enhancement update MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). Security Fix(es): * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415) * mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596) * mysql: C API unspecified vulnerability (CVE-2021-35597) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423) * mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625) * mysql: Server: GIS unspecified vulnerability (CVE-2021-35631) * mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632) * mysql: Server: PS unspecified vulnerability (CVE-2021-35637) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534) * mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427) * mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547) * mysql: Server: Parser unspecified vulnerability (CVE-2022-21304) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374) * mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367) * mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457) * mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633) * mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mecab-ipadic, mecab, mysql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). Security Fix(es): * mysql: Server: DML multiple unspecified vulnerabilities (CVE-2021-2478, CVE-2021-2479, CVE-2021-35591, CVE-2021-35607, CVE-2022-21301, CVE-2022-21413) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CVE-2021-2481, CVE-2021-35575, CVE-2021-35577, CVE-2021-35610, CVE-2021-35612, CVE-2021-35626, CVE-2021-35627, CVE-2021-35628, CVE-2021-35634, CVE-2021-35635, CVE-2021-35636, CVE-2021-35638, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645, CVE-2021-35646, CVE-2021-35647, CVE-2022-21253, CVE-2022-21254, CVE-2022-21264, CVE-2022-21278, CVE-2022-21297, CVE-2022-21339, CVE-2022-21342, CVE-2022-21351, CVE-2022-21370, CVE-2022-21378, CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479, CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21569, CVE-2022-21265) * mysql: Server: Replication multiple unspecified vulnerabilities (CVE-2021-35546, CVE-2022-21344, CVE-2022-21415) * mysql: Server: Error Handling unspecified vulnerability (CVE-2021-35596) * mysql: C API unspecified vulnerability (CVE-2021-35597) * mysql: Server: Options multiple unspecified vulnerabilities (CVE-2021-35602, CVE-2021-35630, CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CVE-2021-35604, CVE-2022-21302, CVE-2022-21348, CVE-2022-21352, CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21517, CVE-2022-21537, CVE-2022-21539, CVE-2022-21423) * mysql: Server: Group Replication Plugin multiple unspecified vulnerabilities (CVE-2021-35608, CVE-2022-21256, CVE-2022-21379, CVE-2022-21454) * mysql: Server: Security: Encryption multiple unspecified vulnerabilities (CVE-2021-35622, CVE-2022-21358, CVE-2022-21372, CVE-2022-21538) * mysql: Server: Security: Privileges multiple unspecified vulnerabilities (CVE-2021-35624, CVE-2022-21245, CVE-2021-35625) * mysql: Server: GIS unspecified vulnerability (CVE-2021-35631) * mysql: Server: Data Dictionary unspecified vulnerability (CVE-2021-35632) * mysql: Server: PS unspecified vulnerability (CVE-2021-35637) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CVE-2021-35639, CVE-2022-21303, CVE-2022-21522, CVE-2022-21534) * mysql: Server: FTS multiple unspecified vulnerabilities (CVE-2021-35648, CVE-2022-21427) * mysql: Server: Federated multiple unspecified vulnerabilities (CVE-2022-21270, CVE-2022-21547) * mysql: Server: Parser unspecified vulnerability (CVE-2022-21304) * mysql: Server: Information Schema multiple unspecified vulnerabilities (CVE-2022-21362, CVE-2022-21374) * mysql: Server: Compiling unspecified vulnerability (CVE-2022-21367) * mysql: Server: Components Services unspecified vulnerability (CVE-2022-21368) * mysql: Server: DDL multiple unspecified vulnerabilities (CVE-2022-21425, CVE-2022-21444, CVE-2021-35640, CVE-2022-21249) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CVE-2022-21457) * mysql: Server: Logging multiple unspecified vulnerabilities (CVE-2022-21460, CVE-2021-35633) * mysql: Server: Security: Roles unspecified vulnerability (CVE-2021-35623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [Rocky Linux-8] (BZ#2110940) rocky-linux-8-aarch64-appstream-rpms__mysql mecab-0.996-2.module+el8.6.0+1057+4d6a1721.aarch64.rpm 47bc5c41294f62208989cd5ede7d6f2f2dbc0c4387d533353bad87c1ae6103a7 mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm e7df893453d68958b2697ccbcb1752533f83e53f24a3d7126ed452d0bf645c6a mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm 0ac811884f2cc859f907f1c6272ee524ba31b137b1c05848e2ec91c2f65aefbf mysql-8.0.30-1.module+el8.6.0+1057+4d6a1721.aarch64.rpm 670b96707531439c05c513ed36a06a21e7032c87da7e966faf1a5ba678c1051f mysql-common-8.0.30-1.module+el8.6.0+1057+4d6a1721.aarch64.rpm ea2015c77cea6157d834cade4e1f7da819d4ea4a81d602856e359424d692bfe6 mysql-devel-8.0.30-1.module+el8.6.0+1057+4d6a1721.aarch64.rpm b1a7e972fc3699e553812025a8646f30c2695add4a94d27e59e5990cd5a31963 mysql-errmsg-8.0.30-1.module+el8.6.0+1057+4d6a1721.aarch64.rpm 5081088c8913a05655693df19dbc2736ec66da9d6fc957d444048a16db25663b mysql-libs-8.0.30-1.module+el8.6.0+1057+4d6a1721.aarch64.rpm 1228fe96e70ff8cccce5d6a6c93158b82731058f32151089c1de18fd272543fa mysql-server-8.0.30-1.module+el8.6.0+1057+4d6a1721.aarch64.rpm 78ddd297f8a940acf3f3281652f683b8af98e935a9eaa9182be0e3d7674c53a0 mysql-test-8.0.30-1.module+el8.6.0+1057+4d6a1721.aarch64.rpm 8408b0c7c82c6024fca48e043faeccd09a11b0d7af3ae12e8316499e98ce0c7b RLBA-2022:7122 virt:rhel and virt-devel:rhel bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * scsi-generic: Fix emulated block limits VPD page (BZ#2121783) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fixes: * scsi-generic: Fix emulated block limits VPD page (BZ#2121783) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132177) rocky-linux-8-aarch64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 54ac9d5ff7cfe04c8c978174304f3b769c6ebaffb5b4867452aaedb5bb405fe5 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 991c3ced4f9f62071fd55347b204cb02700ae6a92105be95b5cd7f8461084189 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.aarch64.rpm 9496f010dd51c309e35489e4b2b4eef9ca205efe10f699e727ebbb87f3216495 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 1d38a90c326e379f852440694d829d9df286e82f0aaaf7a20cf01a1dfd7253c2 libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm bc267e62ab3f58f101086759be4c2e23d04e1ad223dc3e5f9c3e612413663d4f libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm aa5c62e3fbf5ea23307d97e22527f643ceeb7a23ec6cffb8db277971bb87c570 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 857f74550b7100f3bbcb5838ebc3cb625b83804004286b1f4fd7c1b906d64b6f nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 7896e82315caee8ad9bd2644e530296ee622c2ddfae688248185723907e137a2 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 6f525884975cabd1580c6a8d697ccd8c045c659534a0c34c03968e9a21412908 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 8191bb3746b674453d36661d391b8c0e10a95f88c217921f9432d6b8a8bb6843 nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm f52b83ae63637c8b1e7315dfa0fe510aa51b78cc05ccd97b300434e0a28b0ea2 nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 1e49c7614560043aa959388f4518b2768e5425b8f9739ad1140006e3d655db8a nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 0aed2f62163a1ec150571397fd8d769bb51779ad3ef7fd52607a9757f0fd888d nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 766fceeadde01aee98d85e19c6277e616e069ace8b4c11779fdc56c79467bc2c nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 5b25ecac75ab91b2d379ded7bdbe88a94684e18f6061e7cfaed0ffb2946c6096 nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm ce3e3ee3844c0029598e80ba43fbe8f50c0cc992aec0e13d8c6637f171372f53 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d576ab4e2f4ffc7807d2cb0f6e2e25e87c236f476b1a78fa91a9e17f037da641 nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 452bfe16a3fa75235912bfa04b4f11556baee490f77e6321de7e153ac97a5fe8 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 94287915575db12bf71b263335af6131786ceb4b9b92e9c28fbbe8527c6946e6 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d16e4ac2b791ac7c9e318c529447913de8ca95449e1202c8cf32fcbc3cb397a0 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 916e69a5b2bcc4d8b0112922078774ffa5dfaf7f9973df775e1f5ef51b21b382 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 338678cc1b9159003aa7d2ea580f7d42e39a1e5ea2330a84878090fff1430425 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 3c0620998763169c5353c90923dda89dc3de31163c58f37c31baa00b2af81c22 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 39e68e387399720c563214f0b66f299572f479863300baf82e484bab46b46c9d perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.aarch64.rpm a142f30b346e5db77d4f5aa919920b3df24522a614c785efbc8a97df64ae5199 python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 3196143c842626a0a65c59ed1a7d1f7968fce62336a46d65ffaa996eaea74520 python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 430e283968d39a981aac03c2c50e95f1adc9568bfed209ff0c948714a5a2710d ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 9779f9da2de53bef16886c338550c88e75f3ae8884abcb437e45472ff604ab92 RLBA-2022:7125 virt-who bug fix and enhancement update The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124813) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-who. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124813) rocky-linux-8-aarch64-appstream-rpms virt-who-1.30.12-2.el8_6.noarch.rpm a8a8915997def51cea3cfaa933c4fdae496932cbfe2c47b7d7a4aee90117b52b RLBA-2022:7126 stalld bug fix and enhancement update The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126495) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126495) rocky-linux-8-aarch64-appstream-rpms stalld-1.17-3.el8_6.aarch64.rpm e716cbb259033088e5088658e9c8a9387bbb844474ba944eeeb06fa63b89d139 RLBA-2022:7127 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * containers config.json gets empty after sudden power loss (BZ#2130237) * Podman support to perform custom actions on unhealthy containers (BZ#2130912) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361) * PANIC podman API service endpoint handler panic (BZ#2132413) * Podman volume plugin timeout should be configurable (BZ#2132993) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * containers config.json gets empty after sudden power loss (BZ#2130237) * Podman support to perform custom actions on unhealthy containers (BZ#2130912) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132361) * PANIC podman API service endpoint handler panic (BZ#2132413) * Podman volume plugin timeout should be configurable (BZ#2132993) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133391) rocky-linux-8-aarch64-appstream-rpms__container-tools containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.aarch64.rpm e25d4aa99de7f0db48d671a34f066cb910e4569cd41c644125ec0de080b099ae container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 crun-1.5-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 77149ef788493e72d83884f08861eb37fb381af478f8e209bd5b36c3dc9b1fa8 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 22b098f5278453b8bc2f7e9abcaeb06996ac1fdf8881e73a971721abdb8373e5 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 26cfb89e3c1d1e6b25a7f7e40bda6c34c42a141b2ceab4b2d16de8c8a6cddf4d python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 30313d29e17592d71da2f4779933f1dbf9b2adb048ae6b8d3053d93e069552f1 udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 73cd6a5207f2527d63739b30acae92e0f1fe13a6889a7a677bb30891089c3e32 toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 918efe0ebc91b2be593ebd21bd4ab208d02fe9383aebe20f3dd02c5ba61cc1ef RLSA-2022:7128 Moderate: postgresql:12 security update PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pg_repack, postgresql, pgaudit, postgres-decoderbufs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql pgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.aarch64.rpm df1a17426addbb4733fd9fab1f0fbbd4dd3f54ef0a1682538a6dd9d8d73d2b4f pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.aarch64.rpm d0782fc218514b534c798d802db04b8470a6949d09fccbbbb612232742261b43 postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.aarch64.rpm be762f62f3b3e9569e7f1af2d65a4a268c7c4c4b464e203e10109c45e5c71bd5 postgresql-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm ec995b5014adc16ead829460ddc53368ac8e9e440a68c7c1c4ce3a6703b02da1 postgresql-contrib-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 16ea5e830212d63eca87b3dc831798aa165419786770335ea9cca6359debaadf postgresql-docs-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 08acc2b5d43136fae11fbc3cc37e936b14598337c5e4ad4375dee48742ddd054 postgresql-plperl-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm db80ac9bc15b0e100d00b76e9b7f1c6ae0986ff6f8b6b3f83fbe6547f1b336cf postgresql-plpython3-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 54271eae668d06021d7bae1e7c90e3575686024c79514e9e56be966af66400a6 postgresql-pltcl-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 6374f8fd5930453ea6c86ff82d5228f88dc5931cd51c616f7c2a2e7cfcbec17c postgresql-server-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 19e038ecee89870e36a64634fb87a1a7e4df71b6409c59fe38b432924e4d0fb0 postgresql-server-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 0c31bdc60df862d6ef96e241c52e9fd2fa4cee6aba7d03590f078f9af497c402 postgresql-static-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm b172e4b1dc8d57892046dc8c57ddd38ca41f23995049cd740554450733b84efc postgresql-test-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 338d3fa662818fc7a34778ab0b4660e8f8f2de3b444679f004b93b96ffede992 postgresql-test-rpm-macros-12.12-1.module+el8.6.0+1049+f8fc4c36.noarch.rpm a509742a04550e2d84aa41a407c5f4b567d9af0eb989ea2ad9438d313c482c35 postgresql-upgrade-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 605dd84026c92d28e58effd0959500283804eb8ce26042270574b0c9d33ed2ba postgresql-upgrade-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.aarch64.rpm 205566c3c176a3a3e021a4dc56498b59f93fdbf81d0ef092041b7fc2b78cf171 RLSA-2022:7129 Moderate: git-lfs security and bug fix update Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851) * golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * git-lfs needs to be rebuild with golang 1.17.7-1 or above Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851) * golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * git-lfs needs to be rebuild with golang 1.17.7-1 or above rocky-linux-8-aarch64-appstream-rpms git-lfs-2.13.3-3.el8_6.aarch64.rpm c40e56f82a60a72d42033720199e5a3d687f0aa878b9a94b0ff09188ca2fc3cc RLBA-2022:7132 idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324) * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64 (BZ#2121324) * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133036) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133051) rocky-linux-8-aarch64-appstream-rpms__idm bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.aarch64.rpm 58f25fef08ad7b085a1646e5765f893bfcd26afea2fadfd5c1386a8ac5dffce9 custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.aarch64.rpm ed646e8ed3419d164176a4a1397121337c4eae0fa9fde9ab95777df614661a50 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLBA-2022:7240 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix: * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied (BZ#2137345) rocky-linux-8-aarch64-appstream-rpms__container-tools containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.aarch64.rpm e25d4aa99de7f0db48d671a34f066cb910e4569cd41c644125ec0de080b099ae container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 crun-1.5-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 77149ef788493e72d83884f08861eb37fb381af478f8e209bd5b36c3dc9b1fa8 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 22b098f5278453b8bc2f7e9abcaeb06996ac1fdf8881e73a971721abdb8373e5 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 26cfb89e3c1d1e6b25a7f7e40bda6c34c42a141b2ceab4b2d16de8c8a6cddf4d python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 30313d29e17592d71da2f4779933f1dbf9b2adb048ae6b8d3053d93e069552f1 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 73cd6a5207f2527d63739b30acae92e0f1fe13a6889a7a677bb30891089c3e32 toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 918efe0ebc91b2be593ebd21bd4ab208d02fe9383aebe20f3dd02c5ba61cc1ef udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b RLBA-2022:7455 jigawatts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jigawatts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms jigawatts-1.21.0.0.0-3.el8.aarch64.rpm 2d05f4852b7ceede524c35c736fcdf381de5cbb412ecf7762495180db8e7167d RLBA-2022:7456 ansible-core bug fix and enhancement update Update ansible-core version to 2.13.3 Switch from git to git-core dependency Build manpages Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Update ansible-core version to 2.13.3 Switch from git to git-core dependency Build manpages rocky-linux-8-aarch64-appstream-rpms ansible-core-2.13.3-1.el8.aarch64.rpm a563ba54beef1e53d88de1ed5ead6b688f0b456cd4f4019fc6701bc4016f4958 ansible-test-2.13.3-1.el8.aarch64.rpm e05671e8c1af40b2b215b54dcb93e654e87086787d13f029da8a305d676c2468 RLSA-2022:7457 Moderate: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) * buildah: possible information disclosure and modification (CVE-2022-2990) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, conmon, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) * buildah: possible information disclosure and modification (CVE-2022-2990) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 662cc47181d7447f4eaaea4b4dd6b83f13613356445e44cda5ba787fb8b9e3b3 containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.aarch64.rpm e25d4aa99de7f0db48d671a34f066cb910e4569cd41c644125ec0de080b099ae container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 crun-1.5-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 77149ef788493e72d83884f08861eb37fb381af478f8e209bd5b36c3dc9b1fa8 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 22b098f5278453b8bc2f7e9abcaeb06996ac1fdf8881e73a971721abdb8373e5 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 26cfb89e3c1d1e6b25a7f7e40bda6c34c42a141b2ceab4b2d16de8c8a6cddf4d udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 78f1b16f78b9fc7adff79987cdb193a2e5c35dec457c8260a6d52fa9f0c3da69 slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 30313d29e17592d71da2f4779933f1dbf9b2adb048ae6b8d3053d93e069552f1 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 73cd6a5207f2527d63739b30acae92e0f1fe13a6889a7a677bb30891089c3e32 toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 918efe0ebc91b2be593ebd21bd4ab208d02fe9383aebe20f3dd02c5ba61cc1ef RLSA-2022:7458 Moderate: flatpak-builder security and bug fix update Flatpak-builder is a tool for building flatpaks from sources. Security Fix(es): * flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for flatpak-builder. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak-builder is a tool for building flatpaks from sources. Security Fix(es): * flatpak: flatpak-builder --mirror-screenshots-url can access files outside the build directory (CVE-2022-21682) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms flatpak-builder-1.0.14-2.el8.aarch64.rpm cb0aad0d3349b924ae7297c2edc3e4b587bcf3c8784087bd6452a4f2b441cc03 RLBA-2022:7459 flatpak bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for flatpak. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms flatpak-selinux-1.10.7-1.el8.noarch.rpm f000e6bc7105d6e55e8c901dda0312295705d18561cd86c85319bdb15fee0341 flatpak-session-helper-1.10.7-1.el8.aarch64.rpm f4b83d50c59dc593c1b14b795727389af3d0de6e7242c1cb30ef5f7337df4e77 flatpak-1.10.7-1.el8.aarch64.rpm 47e4721137e7cb91b690eb73158df65f9dc06cc7343be3f340b72a62d4a44e79 flatpak-libs-1.10.7-1.el8.aarch64.rpm b0eac1b215922bde99e905d6ede75e6745f9c3fc329f1ed2eb0fdb7cde0e4fb5 RLBA-2022:7460 rsyslog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsyslog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rsyslog-crypto-8.2102.0-10.el8.aarch64.rpm e561122f1df3277485845c7a1216267ad7cb85dd5364304d718dfdc6bfc65cea rsyslog-snmp-8.2102.0-10.el8.aarch64.rpm 8cf664f48dc14b4ed53341188ef73f3187a1ce9bbfd95de58a85d8800afd979f rsyslog-8.2102.0-10.el8.aarch64.rpm d25e8026512f45e2f4e2dee4fd7b0cade0b739371ae2a50b0fc51b063fcd09d4 rsyslog-doc-8.2102.0-10.el8.noarch.rpm d12e90ee2eba31f268851222219d5727401dde065307b50ec6a904ef3bdfe15e rsyslog-elasticsearch-8.2102.0-10.el8.aarch64.rpm 4f65915c67434d50c53633e99e8081f02ee8bfd9a5bf483b69a56c3a9f04fbc1 rsyslog-gnutls-8.2102.0-10.el8.aarch64.rpm 026a6ca6d880a15950709c2ea3cf297701b9a1b68b8359ef3efb8f4978bfed97 rsyslog-gssapi-8.2102.0-10.el8.aarch64.rpm 4f083beb10157e8de5697b3cdacf335c048a927eb87bb6c441de0c7195d222dc rsyslog-kafka-8.2102.0-10.el8.aarch64.rpm 779904fe339e155c53fe55dca7fc69a090492a31f6714269e40167572fbbde8d rsyslog-mmaudit-8.2102.0-10.el8.aarch64.rpm cb0a31f4748802b67db6a95f764907430acd077682ee36bf7ebcab1b7ef28914 rsyslog-mmfields-8.2102.0-10.el8.aarch64.rpm 0ddf7cfb33e929b8eb2f4bc2768871fd08ba95a7d6a5581a568ed534c6fab5cb rsyslog-mmjsonparse-8.2102.0-10.el8.aarch64.rpm 0d81f17980b53ba41edb120a35d04bfa31adc9aa3f9a7edeed0aa7a40a3b4bce rsyslog-mmkubernetes-8.2102.0-10.el8.aarch64.rpm b3c8dde017937636c78e3628c7b396e4ed35aa837a178c9a21e048515a3f681e rsyslog-mmnormalize-8.2102.0-10.el8.aarch64.rpm afe36188cac5375090eec38ceb5f2753e038dd60576ac2fffbb1f57fb50cf5ff rsyslog-mmsnmptrapd-8.2102.0-10.el8.aarch64.rpm 1b24bc94661859ce6920f05c43bd8fb4548703bde5d75179ffb327bd38ca0555 rsyslog-mysql-8.2102.0-10.el8.aarch64.rpm 2f97dca6860d52fca17eb78e1d46ae4cd648c1955609b91cc1b8b8d226254705 rsyslog-omamqp1-8.2102.0-10.el8.aarch64.rpm dcd3c87fef9741a475085f7b366df16d3c714f849a9ff05e8fdba69372a83422 rsyslog-openssl-8.2102.0-10.el8.aarch64.rpm 675ee4cdfaab19eac39f61ab2ab10ebe3533ae10ad7f435f5a9befd43605fea4 rsyslog-pgsql-8.2102.0-10.el8.aarch64.rpm 7a8b4ba721102eb33a48ba922d76dcc9c7364e459f067b39ef627a7774c1b1cd rsyslog-relp-8.2102.0-10.el8.aarch64.rpm 9ec180d554fa60ca76c353a2f236f324516949b1ed8a28a13424ac17b9f50d58 rsyslog-udpspoof-8.2102.0-10.el8.aarch64.rpm acbe4c1fdc4c9fecafe7412f4173487cfb5d8779d62ac504ea516a36d36e6a7d RLSA-2022:7461 Moderate: libreoffice security update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children (CVE-2021-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms autocorr-en-6.4.7.2-11.el8.noarch.rpm 523f57eccce35e2270f95719410183908a5251ba81337e9284f7dda5beda4016 libreoffice-calc-6.4.7.2-11.el8.aarch64.rpm b5d6d1987af9c3c691db2361250a4b0db4e041b4f77cf4832d8cd65959531c84 libreoffice-core-6.4.7.2-11.el8.aarch64.rpm 127c057f0373b187413ff52b7354f2c0173290c41841c92eb73c621d3d7a6694 libreoffice-data-6.4.7.2-11.el8.noarch.rpm c5b41db25cc40f622156f96e9720813142580a7410984913eb3e1fa05dfcb38d libreoffice-graphicfilter-6.4.7.2-11.el8.aarch64.rpm be8a7cfd2c646e34afc5514b562f2916c274ab6353f45b13b52c5c61fa16247f libreoffice-help-en-6.4.7.2-11.el8.aarch64.rpm ff02cebbe6d54703b0550f5e6d3cb325a9804f70a0147963c43af449e582d04c libreoffice-impress-6.4.7.2-11.el8.aarch64.rpm 8c486f45e3934a4c1ee54e5d84abcb92ac9c495718bca73a749299cba3871746 libreoffice-langpack-en-6.4.7.2-11.el8.aarch64.rpm 96f4018719fda7ac51dc552a46bd2acb3765fed30fd95a0b747d6de32fb9ccf1 libreoffice-ogltrans-6.4.7.2-11.el8.aarch64.rpm 5872596695f363018b7fcd627ad90db7623863adebd8ba0d75fe881dd1206dd6 libreoffice-opensymbol-fonts-6.4.7.2-11.el8.noarch.rpm a8a0953db5c80d1181a2974203ff7928e87b59f36dee3ea0e9e46b861df14194 libreoffice-pdfimport-6.4.7.2-11.el8.aarch64.rpm dbd5e397230766214779b9a6b217c16f07a55d2e7dfc88fc36a920d7f3f20c2d libreoffice-pyuno-6.4.7.2-11.el8.aarch64.rpm e8b554c0ec21230dfa9a847b0ff02af9384beb5df971d93fe0e598ab64735b8c libreoffice-ure-6.4.7.2-11.el8.aarch64.rpm a59108eff0fd90a937d89670610a9e42029d0a11409fe99c034be77dff69b29a libreoffice-ure-common-6.4.7.2-11.el8.noarch.rpm 53f00b7b2a3878e3bb85034aa804ab7ed697d4df342ea1302d1e301424173c08 libreoffice-writer-6.4.7.2-11.el8.aarch64.rpm 7cb0a99f25c09fc797bf42198a21fd45d4fefa784147b8f80713165c8a52c514 RLSA-2022:7464 Moderate: protobuf security update The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for protobuf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms protobuf-3.5.0-15.el8.aarch64.rpm 665420f48654c2e4f8cff402cc684447828f2338ff1365b6641b1950723707ce protobuf-compiler-3.5.0-15.el8.aarch64.rpm 58a4123847f64d38b1a58a9b79bd928e33a53334f2531d61fd965be577154cd3 protobuf-lite-3.5.0-15.el8.aarch64.rpm ad4da4d471568c6f17f190d28f623f0baf5b857ad275d436cc7ee4ca4be1f213 python3-protobuf-3.5.0-15.el8.noarch.rpm 032353658522c1218db3ba1b8bb3fc2e1f7b9c01e0c7258faaa0a44da15f1806 RLBA-2022:7465 nmstate bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nmstate-1.3.3-1.el8.aarch64.rpm 888193500064861d2bef443fcf9257bebfe24ce39d849bb0be7099a54e16473c nmstate-libs-1.3.3-1.el8.aarch64.rpm 3caffaf3409708a1f26a3c2e1c5ed9fa8a9032a6829b82ca83dd666733ebca6a nmstate-plugin-ovsdb-1.3.3-1.el8.noarch.rpm c1654ca5dd05c18d2cb0da8506c7ba67d8548f6faed407cc386bf20b49d7bfe4 python3-libnmstate-1.3.3-1.el8.noarch.rpm 49b701eec6829bd48c9f2399ffa7f77c2bcd30b8ced4648d2f2a51cbcf3f863a RLBA-2022:7466 network-manager-applet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for network-manager-applet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms network-manager-applet-1.26.0-1.el8.aarch64.rpm 2e379febc66f85dab2e7e53f10ecf20ee326d07104b2f201502c08263241c17b nm-connection-editor-1.26.0-1.el8.aarch64.rpm bd9add98b022c810c0e817309acd63ab539f3f299c133c1971abb32189106119 RLBA-2022:7467 annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms annobin-10.67-3.el8.aarch64.rpm 3942e780a90a6f900db7c4efc23842aaa910ed781482f397f9e0fad10ed28c42 annobin-annocheck-10.67-3.el8.aarch64.rpm ebcce3de8aa3ed3d2bd619856d96c1a83fceb1d6d64d6e5a1f2467bf6d235085 RLBA-2022:7468 libnma bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libnma-1.8.38-1.el8.aarch64.rpm 0db50e6832d5b1ad7d9a74323be17bf71ac45c5cdf013b5fe303134037f262c3 RLSA-2022:7469 Moderate: container-tools:4.0 security and bug fix update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, containers-common, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, python-podman, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.aarch64.rpm ad21091ede9d1a3c4e6c238cc75f608003b01cf8700469cc168e286fef20cc07 buildah-1.24.5-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 12c561114bf9f8f2e5dc3ae225e67224b3dc18ffad11f35636d039d0cc3c1cf8 buildah-tests-1.24.5-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7bb19c903af75b6621809549b9a66aa7d012ff3b38605a3d0ba5d5ffc9bf3932 cockpit-podman-46-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 31b189daa75aaa373b83e652622ebecc62fb8e4f76e9af1a266b3c90d4c3f9ff conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 662cc47181d7447f4eaaea4b4dd6b83f13613356445e44cda5ba787fb8b9e3b3 containernetworking-plugins-1.1.1-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 02078e4b0b686ff28dd6a2c8fc2e0254e01315accd79bf9b71b26a8c8d8283f1 containers-common-1-35.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 12f83e08d254c36cc3e092e5460706486a602489e77637532e458922a2009b90 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 crun-1.5-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 77149ef788493e72d83884f08861eb37fb381af478f8e209bd5b36c3dc9b1fa8 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 22b098f5278453b8bc2f7e9abcaeb06996ac1fdf8881e73a971721abdb8373e5 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 71a200046fa4f7b382711d1f72b5c03b083b837f039b998a1ebddec2a9bf255a oci-seccomp-bpf-hook-1.2.5-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 64a2115bca254a07be541703c1ac35146167c2e64d18e45a9e7e3bdf29e9225b podman-4.0.2-8.module+el8.7.0+1077+0e4f03d4.aarch64.rpm ca2443dea6e3359ae1041f2a5a2d362919cefc1a4e2e3c2615925245e7ff2c9e podman-catatonit-4.0.2-8.module+el8.7.0+1077+0e4f03d4.aarch64.rpm bf98ebbe7d108d359e248066c88f7a230a4349f7cbc5e77063e0641b76f0e9a5 podman-docker-4.0.2-8.module+el8.7.0+1077+0e4f03d4.noarch.rpm 10a7c81ad06ae9dbdfda484dd13565f7c22151ea91a079a1ad63ed2e531da66e podman-gvproxy-4.0.2-8.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6fb58c664a9061d7d69530eb147602946731805c5c6d8f7888e1a76e0bbf8b79 podman-plugins-4.0.2-8.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 2761b7dc7e082f5a144443fffc62c406399aabbd569490d8d6642a76067e3a56 podman-remote-4.0.2-8.module+el8.7.0+1077+0e4f03d4.aarch64.rpm fda9af6ec9376e77cda02bfa2e9102e968fcaa151daee1707e3d437c7845c30d podman-tests-4.0.2-8.module+el8.7.0+1077+0e4f03d4.aarch64.rpm fd6a3b83747e6dc2c2a61ad4c056923dd970538ebc51e5abb4d888c66e45084b python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm 0d508806b296a75c2bdaa72d2081124644733786fc06ad36fd4e01f1868182b1 runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 78f1b16f78b9fc7adff79987cdb193a2e5c35dec457c8260a6d52fa9f0c3da69 skopeo-1.6.2-5.module+el8.7.0+1077+0e4f03d4.aarch64.rpm d95b022f3738ff486cfd0f1951bb8ed1d1bf7ec00ea6fce5803ca56de0b130e5 skopeo-tests-1.6.2-5.module+el8.7.0+1077+0e4f03d4.aarch64.rpm e1a68b1c8c04a3c78e4c1c0244b42ea1be48ea218c192cc5fa1aaab370594ebd slirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4395c56a677e11bf57b7c1627060cbeb814ae1dcf5948580ab371593f6494502 toolbox-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 181e256cf0335f973a5576ba54fdb313aafa7ebf7bcfb247f0ff2ca13691fbc5 toolbox-tests-0.0.99.3-0.5.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 2df72ff82d0b7f7facbf32a24af9dee0916dea2ec7814d881dd56a566f687e34 udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLSA-2022:7470 Important: pki-core:10.6 and pki-deps:10.6 security and bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__pki-deps apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm 479851b2e9566301b1e71733e38c817e82ccd6173fef75c70e7852e24d7adf85 apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm 3382583f5adf421e2bc4f37f9ae82fdae43c6144cdc0c8cd09722b9621078722 apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm 20723c4ec925f7a4f49a551040e7e94a75cd4739eecf7c32b3b205a26422739d bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm 7cd22fe386c8f745413eef9367495eadaf63317670e2747f08bd7279b3ca6ce1 glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm 07d5ea16128aee1b8072852368f33069b610f782a3994d76693e358770766524 glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm 3dded10b387c1c08a8f634ba8c6e751cebb156695d5b858da1f2cc891fc9acf7 glassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 061c99b696a9a840b9591e660d61beffcbe61e18ac72599dcaf24ef188b2e17e glassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm ec40cebb397db09a391d4162f706e3762cd3cc8600d5ddc2d4ba891a89078698 glassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm 52249c0ec63c97476515047b82485e01ad7badc73e9ec7f5b33a7ef4116eb7be jackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 021b6bbab908defa810779e7c7563b3d3e4eea62371b0fd8415a53dfec57aee9 jackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 5ae90dce57e70c77734e4fca0490456ad67adaef5ed0d4ff2ca877bfd0119c73 jackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm 16274419a438e1c90a9b0d07f0a432f0edf6181cab42e849eee2f6076f0111f9 jackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm 52a8aa7978a2b702869dc8ca55976bfed9f2cfb003fdc81d65b2162ff29a41ca jackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm ad8c589ab3f7d00656b59e9d24882bee22cb52b80382457f6fec6fb4a371e98a jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm 064300d5b29518ce3a4baa2f04abe6a8e0559e52adae98653ea207ca09ddf706 jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm f60d8e2ec935cd115aa524144706048f5d26500b9c3df319b22fc18fed1a19e9 javassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm 299cff22a4887302cd6cb55dff93c3f77e3e4cb07066a4b19abd2c7cb92bdc60 javassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm eb168ae3faa5fb0c043e5526961fde4aa101088765ed887076ce48af552e9c09 python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm f524ce46cad95754a25c9612f6bb535f6ed0ce173df5ba588425dea46f161213 python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm 455c02e2bbe3298d736dd5f6b67317b4130da771067d8575224734edebdf4d32 relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm ab0357dc0d2bd3e6d29aa540bc26bdbdab6959eebd31f6008844813e730b6de7 resteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpm 92ea72f7a67d5de0fb940e1cbbc36752c56f02d056915d35be500fe51e146e6e slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 9971710c31e7b0c9768854360eafa2891c6082e9f2a0a75bbfe6e1cf0bfb290a slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm 647cf21a4854672bcf080675fe924322f5af70a3a4f9ba972647abbe99eda1ba stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm 972252929e9a568938e96b43cf206f5abbb5bb93791c611f3a9af7dbdc11dd18 velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm 568a117caa27ec28c349b46519e84b84bfd1a0be12f2a21e059f00c67df33882 xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm 8f43b142592f3c42a93f407b096cae5fb155672d9717e44de65774aff7845d26 xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm f025ee1e307d46767c90b5a07e5710a60b31c1eb7a9b6cae025fa7e66673bad8 xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm d7d730b9e69ad85470cb96617a0d4cdf4f78e8894893e567ce9bfc0bf9f3b783 xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm 143bdf99c67a7b2f455b4e88436778daee8332d3ab3af46b5cf317200a5aaf26 xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm 31e6754bfff8a8a5e7e6d8545d321c3eb46e08788b287a4a5ecb69aad574e36e xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm 6216ea47969609bddead8aedb848080fcd954f6f13121c5b5376648a166cffc9 rocky-linux-8-aarch64-appstream-rpms__pki-core idm-pki-acme-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm c75bd19936084ad802be1105482da2be5811f29ecb13560b7ee81faa8ac1e980 idm-pki-base-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 02f3a3a945b31588eb0dee689345d951d235c8768466eccfef67c5c39a0d5948 idm-pki-base-java-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm d44b53d8db698569bcd73ebdd90d4cb3f04803e2311b1808b2a57270ea3abaca idm-pki-ca-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm f3f37d4f225cb537289d5e672623ecdc73fef5d5e23fa5dccf2b719a7e96a7f9 idm-pki-kra-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 26f54074d17e768bb73d8cc8a002cda1c2afb6e0bd8a4398b72ebb9e4beb7f2b idm-pki-server-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 3393ab8263567bb27c4a17f9d65107219ecd399e3a6eebeb65fc665e141e4a31 idm-pki-symkey-10.12.0-4.module+el8.7.0+1069+6f3de942.aarch64.rpm 4221a6ae8a99ed94e577f3bcbf60ca0ffe23b417c324a1098f11abde56057af7 idm-pki-tools-10.12.0-4.module+el8.7.0+1069+6f3de942.aarch64.rpm a395291c6054cb3f35c1c21e88e39dd02cb4f0cbd6fa11d4278ad002f47ad140 jss-4.9.4-1.module+el8.7.0+1069+6f3de942.aarch64.rpm b427ce0cc04c501f16ef431c3f6f9ae6dc6d2cd52b0fa386359fda13271cca38 jss-javadoc-4.9.4-1.module+el8.7.0+1069+6f3de942.aarch64.rpm 696d5d66438baf5f72be8b98505e9d81576ec42e7f5c559b75ab1255896ec35d ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 41ba1dc73504947a82ed6eac55fb3a8e991a4c5dde53c9fca773fc8a6ccb75d3 ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm 15f23df9f6fad292f28a673ccc10ffa34aa238bc230a6228374cf6fd20e46e7f python3-idm-pki-10.12.0-4.module+el8.7.0+1069+6f3de942.noarch.rpm 33551818f77ff11cd3b0f352418bd7a4ebee284a87ddb8ccc709d726972543ff tomcatjss-7.7.1-1.module+el8.6.0+788+76246f77.noarch.rpm 086e5c953de53c42f6ae4abcd32e4c9126ba1dd9a028a7a2624a7d8bff1fa27b RLBA-2022:7471 libestr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libestr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libestr-0.1.10-3.el8.aarch64.rpm fa8a539b7779bf1db04a7ee4668681b23052b6ab6d644380e3db533b8f5f6e35 RLSA-2022:7472 Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828) Security Fix(es): * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) * swtpm: Unchecked header size indicator against expected size (CVE-2022-23645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828) Security Fix(es): * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) * swtpm: Unchecked header size indicator against expected size (CVE-2022-23645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 54ac9d5ff7cfe04c8c978174304f3b769c6ebaffb5b4867452aaedb5bb405fe5 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 991c3ced4f9f62071fd55347b204cb02700ae6a92105be95b5cd7f8461084189 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 09388c2d5713d49f885e6b3392307fd58da74d7b6fa6f7ce849e9f18b1b49859 libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm b79f399f3d02e0dfce20a6aaab6b2ff35cb2bfa703c849e327f551bb88d34842 libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm f18c730bdd58dfed86528796516c3542ff9986404d707eb43f85638ef46fc576 libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm a7eea07ba1cfed5100b2df5c7b692d238ba5dc8a818d9a567f5238c135182fe0 libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 90c229c3e85f9d9926413433f7fc1831d5197fe26e1c58bf17bc328da032beb3 libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 9d75b7a60326f8d407640254c611454c5c98617a33ebdbb92f309ee92661fb5c libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm ef7a76cd0531268f356a633c8baa9ed9a65fb7ed0f73225c0850a04e7db7e9da libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 739bbf4afd1555b117b4f6de59671d04ec0667bcdbb22cc2db39ee868075e626 libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4 libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8 libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2 libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm e7a5c7078adc8a316314da0574b495d50c85f0ebf512cd6b2fff6a9c0a5ca920 libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm b15b0dc2907d618b176770530c099b0067f26237906aac20de5e96b28deccaf4 libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm fcf5e04da8b2e33d35b82ad8bcc66fe5a34f7a1539484d14f86f49c1d1161bf7 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.aarch64.rpm 9496f010dd51c309e35489e4b2b4eef9ca205efe10f699e727ebbb87f3216495 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm fdf9b549dff4877676996cf0a5cdc17d751131383ac7e5ab0cf2b219f28b4f85 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 1d38a90c326e379f852440694d829d9df286e82f0aaaf7a20cf01a1dfd7253c2 libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm bc267e62ab3f58f101086759be4c2e23d04e1ad223dc3e5f9c3e612413663d4f libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.aarch64.rpm 02d772236564532af47919abfdae6f5373aae34fe7cdbed742bc4fd95ed8e361 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.aarch64.rpm 65bddcfe7c8336ec5686801ae92ca04f3366f8be416fd043311af9223477c910 libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm eff33094d40123bce40d5726822aa32625b15b459af7d56cccd8616e5ca61c86 libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 5a89f231fbfc4491340ceafa25c41bbd7db9a17ff7947b7a99d16cd5080c61b0 libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 2561be37c3977256dca246ae9e374c97c1621d85aaffe1b0b6744aa71c3bfa69 libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 0574d23fc6c1d769b74ef5f7666125a7b301edb1801434cbf19500ab92ebac90 libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 2c502b05ebbb9e853db1388113851a46369b929d38b0ee23e8f4f3305518c1ec libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 40cc824dd514ce22b14c3f1ad1b8d6df093b60334deeef71d2dc96b7436f0fb6 libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm d03b37b391a04422c49150ec5cc5717220a2b6d0977a46e81b651a891040381a libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 42c4dd97d284866e50e63d2d1db98e9f63c30d59467c7ea43ef8ec76c29552a5 libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm f8942bcae8b750d81ab1b99f66b7062b33f99586024364b16928bf48bd1ac113 libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 1e311faa3eba6f66b1a685d9a0e09e5c88eb8b39d355861d9116f71c14f57dda libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm faa40f783c8ab56b2777c666476b9e205f94631e5c45b6872bec7b01c12c4346 libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 75b6261012555bde88fc4aa77ad2810222feaceaf4bea8fa890128f13aa1e798 libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm c9909bf8848bf6edb5c727282770d701faa65f0a19b3baa92c176ddce51ef7af libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm c35c5153db7d750177a505071110e8e26b0a55cab4e756fd03d2a8e856c206ca libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm cff288b3a34eb2c3de5381bb02812268fe67cf8af5cb1322623de5f6ce36af77 libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 8dd14cf5b3225f5b0dfd5fceaebb699b7f709e27ec768c98b2e7d4cd17c4a9fd libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm ffa765df7a2b1b36e8cab126087e10d5f0acd4d90c476845ab191626383ff82a libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 7f89e2fb5ec93a69cc5b11f6b8b4837a7726872fe65b9dcd32f50c6cbfabe0c7 libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm e7df50b677f8a70716841bcd9433dcbcca6b01f3327ad6bef5fd1c1fae43f801 libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 240f422eff6c62d133d9d7c0051d2c8988268568ca658c697d083d289f92a9f2 libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 524a0e0e7cfcf28a398217580b9c0aabba12339a400380032a0176ecf3413eb2 libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 7895c298bed879f013ec35b384d50680860a7376c5e94167ea98fd3d74ce402e libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm bab033ce89df302994f4cb3904d405281405516558c17b1d841cbed54286d310 libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 1aa83fafddc0692a0f9c91926df1e67f4a5a0f6b537800f314cc0e9addc9664f libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm e8c8225e786675facd5c05cab7c472df7310a6b57914433b15e1fdf5f0ac9ab0 libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm cb174b6fa3b5866e99b4eca46382f1feaf3deb25e7c2bb8a22e475f4ccba6e71 libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm d94dcbd7fb85dda7bd5a67374ddc96a38570a9417d2327210da9c11ce211618a libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 56fd1ea1ac63443293992cddd90cb4fce389c043a63d4f1911e500955f10a06c lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 440b4fd843f1600ab2a3a8620e8999414c5dbd7ff0a5315ce30cbe52a76eca13 nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm aa5c62e3fbf5ea23307d97e22527f643ceeb7a23ec6cffb8db277971bb87c570 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 857f74550b7100f3bbcb5838ebc3cb625b83804004286b1f4fd7c1b906d64b6f nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 7896e82315caee8ad9bd2644e530296ee622c2ddfae688248185723907e137a2 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 6f525884975cabd1580c6a8d697ccd8c045c659534a0c34c03968e9a21412908 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 8191bb3746b674453d36661d391b8c0e10a95f88c217921f9432d6b8a8bb6843 nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm f52b83ae63637c8b1e7315dfa0fe510aa51b78cc05ccd97b300434e0a28b0ea2 nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 1e49c7614560043aa959388f4518b2768e5425b8f9739ad1140006e3d655db8a nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 0aed2f62163a1ec150571397fd8d769bb51779ad3ef7fd52607a9757f0fd888d nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 766fceeadde01aee98d85e19c6277e616e069ace8b4c11779fdc56c79467bc2c nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 5b25ecac75ab91b2d379ded7bdbe88a94684e18f6061e7cfaed0ffb2946c6096 nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm ce3e3ee3844c0029598e80ba43fbe8f50c0cc992aec0e13d8c6637f171372f53 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d576ab4e2f4ffc7807d2cb0f6e2e25e87c236f476b1a78fa91a9e17f037da641 nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 452bfe16a3fa75235912bfa04b4f11556baee490f77e6321de7e153ac97a5fe8 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 94287915575db12bf71b263335af6131786ceb4b9b92e9c28fbbe8527c6946e6 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d16e4ac2b791ac7c9e318c529447913de8ca95449e1202c8cf32fcbc3cb397a0 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 916e69a5b2bcc4d8b0112922078774ffa5dfaf7f9973df775e1f5ef51b21b382 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 338678cc1b9159003aa7d2ea580f7d42e39a1e5ea2330a84878090fff1430425 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 3c0620998763169c5353c90923dda89dc3de31163c58f37c31baa00b2af81c22 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 39e68e387399720c563214f0b66f299572f479863300baf82e484bab46b46c9d perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 52a5808bde45ede583a0db96e7f97248c0580c696bf130e876599b9b23acc320 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.aarch64.rpm a142f30b346e5db77d4f5aa919920b3df24522a614c785efbc8a97df64ae5199 python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 3196143c842626a0a65c59ed1a7d1f7968fce62336a46d65ffaa996eaea74520 python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 9a3bb24f836e37a82ae94971bc9a3a91703c6994c675e687c3b98890f14ab20a python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 430e283968d39a981aac03c2c50e95f1adc9568bfed209ff0c948714a5a2710d python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 344571b98f62a01a4f3e496fb72b2aee5cc5d176ec1886b7084d1a7cc3e67436 qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 56bc8ded46f383ae7010cfa68f1b63bca7444386136411c05ab653f8bcceed16 qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm b86ce1538a7e86e25892cafa821a40a51a3060b6b2338ac33fc77ffe490ef398 qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 86bdb43889e488440a401246b21d336fcbf59f3c8847789dc8e619b71c096e12 qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm f515015d9adc8c11e69b71fc4c57780ed8fec77301a6336da2f1f0259878ebe4 qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 0d3aafe1997ad03ec93e046a14971f8ee5448b902c2542dda792015fcb3e42fb qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 596f71a855faf3468df8f67f985bfedfa7c8b0c07a2247b6c5ee6e2859c19256 qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 331c2ba5e40ba881026c0ec1fc8f7de4f0fd204fa410db3846cab89195e437cb qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm b5d1e3a3fc7f5bc978f6d28f72b92beb634109273ab2c95d09107b0c7d219fbc qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 24204ad12f6d1603e1fbba9630ca1f186d455d74652fdcf73e47290602299736 qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 74bbd328b8201c540395a681ab50beaaa3cc2769c829e3b3f9b548be89fe5f93 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 9779f9da2de53bef16886c338550c88e75f3ae8884abcb437e45472ff604ab92 ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 170624a8f7de11497719a2006c84a9a455db4935663c1ce6be6d4bd7dd6a7ae2 supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 5f0207b3793a77832c80929494fabaac45b48439c31e59270e7354efb7e16d73 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 4ee91ae1900c19ea16f63ecb68516f8e57ab573d4ddfad831a61eb3797c3fe3d swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 55da933062600cfef45df3e4a68d652e0a73d8e1054ecc4ae8540e7ec2da8e63 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 54bda5e86eac5c5196b4aaa5b58fcf2a664e5298d0653f3613e13ab8f93c0563 swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 46cc83ca8d215f72133283dc69c760e7a6d90d6f529dc1c4984eb138c4e6cedb swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm d49f7fed94d56270745f8a36eafcc91e9ff1d388518728e049285540e7332785 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 8e0ea3f78c79b3b7ee562fc46f2ea3a9a8a75cbab5520de2a44b87668866e466 virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm f80dd339df16120425aa5b44a0a6bca5364a298e545b6cd4be988acf90d3517a RLBA-2022:7473 redhat-rpm-config bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms kernel-rpm-macros-130-1.el8.noarch.rpm 9cd56deb5481f895537c65561edbe8acb12712d430da972565fe349fe213c5d1 redhat-rpm-config-130-1.el8.noarch.rpm 1fd4e15c423d85b224c0baf80bcc6de17f38a01636cd4ecaaec81b8e405065fa RLBA-2022:7474 pcp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms pcp-doc-5.3.7-7.el8.noarch.rpm 5801ed335c4b6b87b650b867866987aefcc223f191fb044938a89e6f29868e63 pcp-export-pcp2spark-5.3.7-7.el8.aarch64.rpm 16e27e959b19b1009e882390ccb6b734151acf2da3b0ea1da9516d599f83add2 pcp-export-pcp2elasticsearch-5.3.7-7.el8.aarch64.rpm 559cfac3e799dadf517e22cc82cbbeb690bce84786a9bdd60ae9e7fb6bd75d42 pcp-export-pcp2graphite-5.3.7-7.el8.aarch64.rpm 6db1f0e5bf8dc6aaa518467115f4f176e2fcdf62f472a1e2e8761019961d1867 pcp-export-pcp2influxdb-5.3.7-7.el8.aarch64.rpm 5b40c39335183956ae111de5c3fd96d3e187304df332cff57174c787d8967833 pcp-export-pcp2json-5.3.7-7.el8.aarch64.rpm bd32e93b6a59d66efcc50bd6035ea3b859218d2ac58d37bde4be642727b689a7 pcp-devel-5.3.7-7.el8.aarch64.rpm cc2b55d24d0ead9ab5ebcb777420041fdbc0e5afa6de4b78ae13a31d768eeae1 pcp-5.3.7-7.el8.aarch64.rpm f6bb7a2c16c29c1ba93a72361ab5630b10d4f9b93af2d6be2ed51e210eadb809 pcp-conf-5.3.7-7.el8.aarch64.rpm 6a06536784901df6ea7a66b4d1fd93df6f7fe606d24da44f716ca9ce04dda381 pcp-export-pcp2xml-5.3.7-7.el8.aarch64.rpm 3741a76be69d5bd028cd2a5956fc4f6c7bce09c6e0af136d022c897a323bf2fb pcp-export-pcp2zabbix-5.3.7-7.el8.aarch64.rpm 282227ce0a0d2c0b0a5c9dbcdbaf653d1d2c4a26a916097e55f57bce7865c375 pcp-export-zabbix-agent-5.3.7-7.el8.aarch64.rpm 117564f683d1374539e2a243b22ba7f63e9d5028ef82c6330d3485af52b84840 pcp-gui-5.3.7-7.el8.aarch64.rpm 1cd678766fe1f2e0ea34108d87c5292c27ac86cf4a26b465b7faf229e9824df3 pcp-import-collectl2pcp-5.3.7-7.el8.aarch64.rpm 08027f9b9ecaa6dcace9fc029e74c15a89a438ba4c3c98aebbfa8229110b8198 pcp-import-ganglia2pcp-5.3.7-7.el8.aarch64.rpm 2f4d329bcdb0b845a50fa92802784ec0a9392366d379400dd1d7afda48ede1d0 pcp-import-iostat2pcp-5.3.7-7.el8.aarch64.rpm 09cc588068761a371d883691034b259e1531a8a8264dc5007b80de622b9a377d pcp-import-mrtg2pcp-5.3.7-7.el8.aarch64.rpm 12343b2c5799fec356375f50aa20e45d10a9d63cff50d8ca55044e3a14a8e3bb pcp-import-sar2pcp-5.3.7-7.el8.aarch64.rpm 5a6502c743a4efdc60cd1dce0754ce82263e55ec1e18ccd0887e814925596d1a pcp-libs-5.3.7-7.el8.aarch64.rpm 9bef93b5ace2aed9067bf08b0878984916d4927a59ad6c723c7a35e7e513c3a8 pcp-libs-devel-5.3.7-7.el8.aarch64.rpm 92ba40a06c147e11c6a8d8a1484687251d5c935df21fe1abe493fa73e0def83f pcp-pmda-activemq-5.3.7-7.el8.aarch64.rpm de9a43068d1648c88a5db16ec0a952d5a9161ba2f96f5c7b1de987557727bb24 pcp-pmda-apache-5.3.7-7.el8.aarch64.rpm 0475f61e9fed327c82d5823b8cb8d6503c25f0306453ff309bb41a333b16d840 pcp-pmda-bash-5.3.7-7.el8.aarch64.rpm 8151b0efdcc53348e14a8eecb056d854d0bfd9b6992b4d940f10b27438882a5b pcp-pmda-bcc-5.3.7-7.el8.aarch64.rpm 634acf8f737540a5e4d5d7539ae8b60c41ee119d40f0896dab1dfe42b49be2b5 pcp-pmda-bind2-5.3.7-7.el8.aarch64.rpm 451735549d8c16db6237ea354c39bb5c9cd41232248b828a863743b19a41adce pcp-pmda-bonding-5.3.7-7.el8.aarch64.rpm ea78af620e296624a679ae9d73fd9c32dcee9ef24d42ce5f8d9a6e35ed820ba3 pcp-pmda-bpftrace-5.3.7-7.el8.aarch64.rpm 54ac77b3647eab3a3454993f284eb0de1611b95cfc979b0eebfd8dabcb4fda2d pcp-pmda-cifs-5.3.7-7.el8.aarch64.rpm f3d3469e12a69af520dc1e7415248aebc2f64e6b79bd73eb143fd4174b629bac pcp-pmda-cisco-5.3.7-7.el8.aarch64.rpm 9331e625bc469f7d7947dc8e385f167678793b6a43db33c5ac7e622fb1d92776 pcp-pmda-dbping-5.3.7-7.el8.aarch64.rpm 17a28f63b8235151e4d008ae1fd434032cccbe4ff48f3fe20473f1791b1fca97 pcp-pmda-denki-5.3.7-7.el8.aarch64.rpm f52a52ba79f05f2218f43dcd710f2ab2656cec49ba9aa0ca7f4d5bca710d0be4 pcp-pmda-dm-5.3.7-7.el8.aarch64.rpm ba165d80de14c20da3d40cb30b366448a90df8dae6de0c8fb227006750f7eb48 pcp-pmda-docker-5.3.7-7.el8.aarch64.rpm 12bc7d6a10e7c669ad92e428af12469e1165119fce5e2ab15398c8a1a4fb0d07 pcp-pmda-ds389-5.3.7-7.el8.aarch64.rpm 944a1341af6dfc8ada266698633ba6504c261dc68193ceb18be78bdcb9e39482 pcp-pmda-ds389log-5.3.7-7.el8.aarch64.rpm d322b7faea6d03e3bb72208c34f48abda126ab597ba6c19274661acd6bbc8f9d pcp-pmda-elasticsearch-5.3.7-7.el8.aarch64.rpm 98f09fa0d004b9f5de0173db51455153cfa1cb16c39a9d1bd84d198d0dce0c84 pcp-pmda-gfs2-5.3.7-7.el8.aarch64.rpm fa17dedb6a4dd9e7e3e6eb07d6dc427e4a52c831ed3e8fbf48317b431bbc9100 pcp-pmda-gluster-5.3.7-7.el8.aarch64.rpm 107e91effef5fecba3dbcd5d39ec8ae04ef22e58a2e9fe649bb084792e28764e pcp-pmda-gpfs-5.3.7-7.el8.aarch64.rpm f61a2b65e8fdd1fcb6ff4100b5dfecaa86a8afd16ce05d882ebf165599d6c700 pcp-pmda-gpsd-5.3.7-7.el8.aarch64.rpm 93e3c4ba55b353b6e0dd0e7e2394a467c88e425f141eeee41fc48e6e8973ccef pcp-pmda-hacluster-5.3.7-7.el8.aarch64.rpm ff3ee2f76d21571acf2dac3270ae4f94be8c9bb0a1888b5c248a1977a8b868c3 pcp-pmda-haproxy-5.3.7-7.el8.aarch64.rpm 4e283f814de21ea0bc595468ba43f0d5e2dbe421f1459eab8ca33d6ddc4492e2 pcp-pmda-infiniband-5.3.7-7.el8.aarch64.rpm 6993daaa77cef4271f96268f62e620c2dcc7d123a94cf2ba6dfc05535345fdd9 pcp-pmda-json-5.3.7-7.el8.aarch64.rpm a540ef781be39726b3c8e7443ab63525c6b2ceb6b1f34136a3aece6e6fd8bb72 pcp-pmda-libvirt-5.3.7-7.el8.aarch64.rpm ccd2777a3a9a58b015c543dfdcebe6abb26af40f7a7e7b963197af2bb0fae620 pcp-pmda-lio-5.3.7-7.el8.aarch64.rpm 0a2be3d24f118fd405dedee737c5d80ba64b4696051febe7a68a7aba8a33479c pcp-pmda-lmsensors-5.3.7-7.el8.aarch64.rpm 6e2cb5e79801bc4fd9d8ec00630acc29f060f560ec125c9e42837a6365edfcba pcp-pmda-logger-5.3.7-7.el8.aarch64.rpm 8ad370803a401d76168cf551cf29878a348ffc57d0294c55c9538b4714cb7f99 pcp-pmda-lustre-5.3.7-7.el8.aarch64.rpm 958d1389e0f9c3265d5911e257be7b06516920bc3ed9bc7993a53a383e45de0a pcp-pmda-lustrecomm-5.3.7-7.el8.aarch64.rpm a60d9882db06b33d5857bf51b68b7cbdb4083a5221693d86df7b7f7fc63a7641 pcp-pmda-mailq-5.3.7-7.el8.aarch64.rpm 8e3792b40cca5ce8679b65327e31e5b0579696564ad62c7fc66700455e097bac pcp-pmda-memcache-5.3.7-7.el8.aarch64.rpm eb27403c98cca8a24db0eed928ecc570d5e6f31afe01b2a0d41a260d1eb68861 pcp-pmda-mic-5.3.7-7.el8.aarch64.rpm b298122be5faff6f74e480256b8207fe9df6bf290d18595ffedf34abe27d60c8 pcp-pmda-mongodb-5.3.7-7.el8.aarch64.rpm d49457c7065d7e4b3a37dcb096b023cd6c50c3c499be082f303f0ae80f73fe92 pcp-pmda-mounts-5.3.7-7.el8.aarch64.rpm abe6aa6569f363c4317eb2a66ce1d06ff80a1cf4bc55f52a10b66ad8b7fa40bd pcp-pmda-mysql-5.3.7-7.el8.aarch64.rpm 989f1ebb1f0d7a38b83a4bc8edb45056dca7e87fbdfe5ca387f743a22679a452 pcp-pmda-named-5.3.7-7.el8.aarch64.rpm fcb8ba03c53fb25d7d476769595219d63c99dfd89c8bb7f158f7772f9b667255 pcp-pmda-netcheck-5.3.7-7.el8.aarch64.rpm ddeab13dbd02021dfa1562e5cd8a21782cbc35e37238e2d35097531d769b27b4 pcp-pmda-netfilter-5.3.7-7.el8.aarch64.rpm e2130331dfe2e0cfe2f620773d4e1f3c86e1c22ffbbc20240be7fb9b89db3b15 pcp-pmda-news-5.3.7-7.el8.aarch64.rpm 35754c9509a349d4252358cb2ff7dfafabf1cb9dffaae85bd09ed941f819149b pcp-pmda-nfsclient-5.3.7-7.el8.aarch64.rpm 5ff0e2ba8574d06a2a742aa29a7421c113b6953800478d4c4f1086bcd6192cdf pcp-pmda-nginx-5.3.7-7.el8.aarch64.rpm 997b146724b9a1e4ac214b289d714da07bccce1316cacbfce96f96398d74d21c pcp-pmda-nvidia-gpu-5.3.7-7.el8.aarch64.rpm f0aafbe4558dc017e74d369ad965544b889872e6423d17916ff9ac025866fdec pcp-pmda-openmetrics-5.3.7-7.el8.aarch64.rpm c63651fe09f8373a80e0daf4b7c60fa8866daea9f4eca4e7f9ba0c2b08fd9cb5 pcp-pmda-openvswitch-5.3.7-7.el8.aarch64.rpm d3093c0c5467db1647802a9f4b6a0aeb38f96e290776701f6585db4b96ed2bdd pcp-pmda-oracle-5.3.7-7.el8.aarch64.rpm c20c83ff936be8ef3b4735b3e24c3a9411e223e379b957f44a607377fb9ab151 pcp-pmda-pdns-5.3.7-7.el8.aarch64.rpm d0de88446ba7ca83778bee61965cfaad1c08c7ed10a7d82fca318a85f8718a39 pcp-pmda-perfevent-5.3.7-7.el8.aarch64.rpm 89810072a7fb304e5dc49c77745e9ac2fc1d4d54f8119ccebffb58457f3fdd49 pcp-pmda-podman-5.3.7-7.el8.aarch64.rpm 0a4f98258bf78fe96848fe482fc7b68a315f89fc8454631d0519d81c9857ad01 pcp-pmda-postfix-5.3.7-7.el8.aarch64.rpm 2795d690f82e4bcf34f27887ff22d7afda6cb33bdeb63bc56f9e896e6dd77bb7 pcp-pmda-postgresql-5.3.7-7.el8.aarch64.rpm 11790fc6f11b0977cb766bb6c4f97e40ed3c17e51c73c0843ab29346bf10a1d0 pcp-pmda-rabbitmq-5.3.7-7.el8.aarch64.rpm b380d673bf9f83bf17c1c70fb7ffd311efbe5a1547918687f1fe3d9a10c860d3 pcp-pmda-redis-5.3.7-7.el8.aarch64.rpm cfe63795b6b661f40c1931dbbc652b2646c2b12599aa294a509fc8f8d9bb87b6 pcp-pmda-roomtemp-5.3.7-7.el8.aarch64.rpm b831e253530b0d8066cb7a1af6074a180d132a9680f78ca1ef2a23bb5d940aa0 pcp-pmda-rsyslog-5.3.7-7.el8.aarch64.rpm 78eac23b3ea24aa5b0e21c7b800602b36adedc89d4d5ee0f802f4773a5219b9a pcp-pmda-samba-5.3.7-7.el8.aarch64.rpm c3b0a9f7b24051f853b2979a0a3ffa1c62cb1dd066d52f08c011794c8f5b86d3 pcp-pmda-sendmail-5.3.7-7.el8.aarch64.rpm 58c5d43f3101d3462628be669f99c53db86e60833891aacfb8fce855415dd4d6 pcp-pmda-shping-5.3.7-7.el8.aarch64.rpm 52297fbb49cb2c750442be3c63e4daa6f06ade4b7c878797f7cc08408b29950a pcp-pmda-slurm-5.3.7-7.el8.aarch64.rpm a4d95ba1566d67966a7dc65c94df763b17523a81d3a2d2cabb97545a09e07057 pcp-pmda-smart-5.3.7-7.el8.aarch64.rpm a16403a0caec66164f01f9cda37f6ec92c0a5848b75313741c42a56542ebd9a8 pcp-pmda-snmp-5.3.7-7.el8.aarch64.rpm 39c9f18f5e1fb66b1c427d4729d3b7252d983b8c88e7e4fbb3948d05ae444c54 pcp-pmda-sockets-5.3.7-7.el8.aarch64.rpm 28446e791120a2d1570c35d902b071056d61ec3a0614fa78cf48a77314412662 pcp-pmda-statsd-5.3.7-7.el8.aarch64.rpm a6a17c5fc11f6a1d9a2ae798688d3a9ed7626447a58e20271a218fd2e106177d pcp-pmda-summary-5.3.7-7.el8.aarch64.rpm c6261fa1d7807f39bfdf30a0183d5420c57f542c5de8b9c6f4e6df9a3a4a2ab0 pcp-pmda-systemd-5.3.7-7.el8.aarch64.rpm a6dc1e4586a036b3fb15da2367cb6c8998d515f089169c86ecaed475c31f6d89 pcp-pmda-trace-5.3.7-7.el8.aarch64.rpm 484522a208e9f1ccd0e6a322c9fffac845e130312b0554c23f6ccee08690d24b pcp-pmda-unbound-5.3.7-7.el8.aarch64.rpm 87ed35c171437f05bb859b287daa73a88e0c96d6d1290a54d609ad07e7a694ae pcp-pmda-weblog-5.3.7-7.el8.aarch64.rpm 06ec00de778f9ba5843cb2952b3d3165b68c8fb16396b98e7a90ebd7e90a9f2c pcp-pmda-zimbra-5.3.7-7.el8.aarch64.rpm ecf9de23c0d107b682d0a5efa7638a37eea54a9976c9d55ed74f034e918f37ae pcp-pmda-zswap-5.3.7-7.el8.aarch64.rpm 3e696a4c47c4e9a3eaa40fa5e6f4a933e123ff0dec67754f42fe805c4a0873c7 pcp-selinux-5.3.7-7.el8.aarch64.rpm c576c18522b374a2bc36cdfffa0bc42467169084fbd2bfb6b7829b86e1e42b72 pcp-system-tools-5.3.7-7.el8.aarch64.rpm 37fa043a92248e7604698d6cb2ca1482431f4d154c59c931d07b4fe05cd01ab1 pcp-testsuite-5.3.7-7.el8.aarch64.rpm 123fe18ad9513961ece7d20ae7bdf5d6169b74c2f224a9b183a163d18b10d2f9 pcp-zeroconf-5.3.7-7.el8.aarch64.rpm cf62af57a3d2427fe6f34b3727bcba77c3dedf9711fd1cf33bf0d01ce96348ae perl-PCP-LogImport-5.3.7-7.el8.aarch64.rpm a46085edf70c843695e94cc323223fbc2219a7d27c37bd2fee042a0adccd59f9 perl-PCP-LogSummary-5.3.7-7.el8.aarch64.rpm 824917334910d14684a302ac9cbcce1dceb8ca8313a654e0d3422545600b1049 perl-PCP-MMV-5.3.7-7.el8.aarch64.rpm b9f15258d442ac13a23c3dc284939e2c06cc1deda8d927a0feb8c51ac5bafaf4 perl-PCP-PMDA-5.3.7-7.el8.aarch64.rpm 3ecf123d18be19776c1bd939966d75f8ab03dbf11ab466ade608257c45dbea3c python3-pcp-5.3.7-7.el8.aarch64.rpm 4fa8ae2d4fa808196f4c15064d5b39a5ed85fab90ac1ba5d5ccce68a8ba25de3 RLBA-2022:7475 flatpak-xdg-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for flatpak-xdg-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms flatpak-spawn-1.0.5-1.el8.aarch64.rpm 009faa4d3a13c08cd9e06520420c72d3e1d0ac03d0bf37d12762ea94374abf59 flatpak-xdg-utils-1.0.5-1.el8.aarch64.rpm 9a9d77deec4e3b3154ac605bcfc3f05154b3db20727543e9c4ca21a29e292125 RLBA-2022:7476 xdg-desktop-portal-gtk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdg-desktop-portal-gtk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xdg-desktop-portal-gtk-1.8.0-1.el8.aarch64.rpm 99ce07a88885ef984ca310ba4a83d6597fe4eed736196c712401770b2b31c0c7 RLBA-2022:7477 motif bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for motif. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms motif-2.3.4-18.el8.aarch64.rpm c190fd5b762a0ec5cba3ed1a2668187336b2fbbff9b8b77b29899c1f8924bd6c motif-devel-2.3.4-18.el8.aarch64.rpm eb150a252116ffbe3db736391c76e51c83acf9d0bea3b4a86021e4d2ea697e59 motif-static-2.3.4-18.el8.aarch64.rpm 37828083b78473e94d31a256bcaa7f12e64ed63d7148163b42abb82d3c938cb4 RLBA-2022:7479 xdg-desktop-portal bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xdg-desktop-portal-1.8.1-1.el8.aarch64.rpm 340339dae85b0bb66863796b980024aeb0957c91c6486de1f9f4b1cf5cec6164 RLBA-2022:7480 mod_auth_openidc:2.3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_openidc, cjose. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__mod_auth_openidc cjose-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 167194b776db1036319dda56b06909ff2660411660b1904aa3744804890143c5 cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.aarch64.rpm 147c2a485b610d217ea9d1b92fce09583e1eeeebf7c1ac0d792ec5e61cf8c508 mod_auth_openidc-2.4.9.4-1.module+el8.7.0+1061+55d14382.aarch64.rpm 2c18786f6b304cdf00c4ee16e142a12e753f66f1f55f9294f8a7d5d67093dd36 RLBA-2022:7481 python-qt5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-qt5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-qt5-5.15.0-3.el8.aarch64.rpm 20161e51b05807d6cdd876ce96eaa3c1f34d4ed9c2de454b00337168a177f2a1 python3-qt5-base-5.15.0-3.el8.aarch64.rpm b793f12f6847bd00e31d7984d85cec03b32ce19de1b79bd2b6ccdc4c9f73d57e python-qt5-rpm-macros-5.15.0-3.el8.noarch.rpm 5841de551507eff9e1bca1cc379412ea9c4a23711fb5ff6969f4085f4e2a3eef RLSA-2022:7482 Moderate: qt5 security, bug fix, and enhancement update The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377) Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for qt5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377) Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-rpm-macros-5.15.3-1.el8.noarch.rpm 318bce8eeab528f3f10626f40aa1cc9301c90d4738155043da3b39a447afe501 qt5-srpm-macros-5.15.3-1.el8.noarch.rpm 3c67f14e96c3953ccae000512d56e7db073fedac51b7a3cb79de29fc941b6891 RLBA-2022:7483 adwaita-qt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adwaita-qt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms adwaita-qt5-1.2.1-4.el8.aarch64.rpm 5606e40a9573e0cca03a929a74a4bdd56e2dd1f5c59271bcc05d00c37524026f libadwaita-qt5-1.2.1-4.el8.aarch64.rpm 0d053d342489a69edf60674e4d7220000eb5887c9bc9ee2273c91b6f22e05758 RLBA-2022:7484 qgnomeplatform bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qgnomeplatform. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qgnomeplatform-0.7.1-3.el8.aarch64.rpm 0dadd6bcfc74d610baadede794c294c127b46ffef9406d1c5bdb4ab8d92ee922 RLBA-2022:7485 qt5-doc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-doc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qt3d-doc-5.15.3-1.el8.noarch.rpm b578c8870ee6e910502e42b81710fc8a6e985b198e0617fc85791f44cc942c59 qt5-qtbase-doc-5.15.3-1.el8.noarch.rpm a37d8b86162330ecbd017e593b7713e1f8d0b4a07e8221b2af1a6696209d6244 qt5-qtconnectivity-doc-5.15.3-1.el8.noarch.rpm d68d4c01de884931c2f872003220916688ca1f56f377394b9c7669ee22c2cf20 qt5-qtdeclarative-doc-5.15.3-1.el8.noarch.rpm 2f3bd7e7948bb220f0ce95641a66867f8d2c3c4d56d8b06a4c8a0a1715d9f19f qt5-qtgraphicaleffects-doc-5.15.3-1.el8.noarch.rpm a47323715d075aef530937b15aa3def0a83236230aa78eec946b8845f14d4257 qt5-qtimageformats-doc-5.15.3-1.el8.noarch.rpm b78e11fd07c00d5cac56fed0399c6265ccb4a5028444fec9dd48c6057c1d92a8 qt5-qtlocation-doc-5.15.3-1.el8.noarch.rpm 17926542bc2a4728e759fc6976f8bc474a150647b908744dd89244cbe7e19b3a qt5-qtmultimedia-doc-5.15.3-1.el8.noarch.rpm 0ada051b2273caae04efae6cd4fcb5c72cd7bf3a1655d91d47dc9ba8207282a2 qt5-qtquickcontrols2-doc-5.15.3-1.el8.noarch.rpm a60592429c1c1849ac4214e529bddb43db4930662b0f5b3b8080660c62a8b663 qt5-qtquickcontrols-doc-5.15.3-1.el8.noarch.rpm 4c0d9d49de82d2a7371ff8066aec0fa9295c26eb8cb46ba5a7105630804cdabf qt5-qtscript-doc-5.15.3-1.el8.noarch.rpm ca663a26418cff9367340ade7a1bd5474b2f7749ff45f3ef78b5c2e2f3711b85 qt5-qtsensors-doc-5.15.3-1.el8.noarch.rpm 150059e9748d920c4c7bc7187ac9976c2962d56338129de13659772526a873d8 qt5-qtserialbus-doc-5.15.3-1.el8.noarch.rpm c42f425f201373eccdc9868f46d015b31e579e6371cc2e95a9e21f8f8371f97b qt5-qtserialport-doc-5.15.3-1.el8.noarch.rpm bcb7190d9641cc04d64e568ffbf55561b43e3c010e75ced68cd3c3ce079e99e7 qt5-qtsvg-doc-5.15.3-1.el8.noarch.rpm e0409aeeceae97f8fe2ce907e39c9044e5ab19bfc63fe70631de723e62df9011 qt5-qttools-doc-5.15.3-1.el8.noarch.rpm 47067ec7068fee6779714e18ed430650779a66ada664e10bd3d215f0c86bbef8 qt5-qtwayland-doc-5.15.3-1.el8.noarch.rpm dece0d172de59c7ed2fe4a0ba2a254e907a881fd779f709782101a975ad137fa qt5-qtwebchannel-doc-5.15.3-1.el8.noarch.rpm 07786d83f41f9caf0090d57714cd30a4a126880b29759292b3605b58e2b3076c qt5-qtwebsockets-doc-5.15.3-1.el8.noarch.rpm 5458756aa5dea8068108c34f2a0c42bd57f7981f359ecd197750a5a9643b5d94 qt5-qtx11extras-doc-5.15.3-1.el8.noarch.rpm e0e3b5caeb20ce57596ec80050bd292305f48c01ec0acdde06fe4f87341bc371 qt5-qtxmlpatterns-doc-5.15.3-1.el8.noarch.rpm 62f8c4c51edbca393ac5f6e53c17a96ac5384a2d1315e7b29a5cdcaf4e4ac427 RLBA-2022:7486 qt5-qt3d bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qt3d. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qt3d-5.15.3-1.el8.aarch64.rpm 38fd287e3a1663539c80a4f96a13a18f69f605ab27de52674774f9dd04a112fe qt5-qt3d-devel-5.15.3-1.el8.aarch64.rpm 1d6701a623e6e7365b2745061dafc921d5c496c7e461dc991f9d92b41bdd0cba qt5-qt3d-examples-5.15.3-1.el8.aarch64.rpm 1b8b692d2233916430ca4821ce54f1597ca669027deeb997de95c1344f5c5e30 RLBA-2022:7487 qt5-qtbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtbase-5.15.3-1.el8.aarch64.rpm 68c042c14ca892604c7c0f24f26672ea62ad196d96ed948dbb5d4870c9c50395 qt5-qtbase-common-5.15.3-1.el8.noarch.rpm c9beaaf5b55fd368b320648260a863f080cf9f326f5c6baa209a83266b6a9374 qt5-qtbase-devel-5.15.3-1.el8.aarch64.rpm a617adb9ef4c8005b66f0b93ab0edf52eebc2aa44e85102696ee05ccf8373a52 qt5-qtbase-examples-5.15.3-1.el8.aarch64.rpm f65679b08843ecc23f718ae33c100043b1dd25111855deeaf9a4d18f0e351bdb qt5-qtbase-gui-5.15.3-1.el8.aarch64.rpm 43549b83b693d26fd36124e8a7dbbfb49b1eb82d1af194264f29efda258e3820 qt5-qtbase-mysql-5.15.3-1.el8.aarch64.rpm 8af7153e94b8fa7880a78893c2b64f11297ba317f375e2dd477dff0e2d671b52 qt5-qtbase-odbc-5.15.3-1.el8.aarch64.rpm a8d575e20a68a5ce6e8df7ba82f389b5cfbd04e8762f4493a95931cfaa34c1fa qt5-qtbase-postgresql-5.15.3-1.el8.aarch64.rpm 3adde48519b8457a55cf6c155f2e34b88fc668673aa111e293b471961b8b7e21 qt5-qtbase-private-devel-5.15.3-1.el8.aarch64.rpm f7cb780db5a3db6cd9619cab70b551d5a888ee7fa31a3d079b2c92d064314d4d RLBA-2022:7489 qt5-qtconnectivity bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtconnectivity. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtconnectivity-5.15.3-1.el8.aarch64.rpm 45e9ca9af2f70ee673d0db37bfa68169e7f94e30e85c94e3d2b2c6512b98c4f7 qt5-qtconnectivity-devel-5.15.3-1.el8.aarch64.rpm 30655f2340612581766284c692873a426d42f1ffc557dd11fb9dbb3816adc915 qt5-qtconnectivity-examples-5.15.3-1.el8.aarch64.rpm 60dd4d8f2c727fb4d50cddb90a686fff8fdf4c92209862c371d5655188930d06 RLBA-2022:7488 qt5-qtcanvas3d bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtcanvas3d. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtcanvas3d-5.12.5-4.el8.aarch64.rpm becb4159071dd7c3ccbd0e3995e34892a645005a73ef976ff071e8f82f5abe94 qt5-qtcanvas3d-examples-5.12.5-4.el8.aarch64.rpm c1b220fef09a7dc0ae97ea11b244312ee7d3a1b57dd69e0203d09a5c6c71dc98 RLBA-2022:7490 qt5-qtdeclarative bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtdeclarative-5.15.3-1.el8.aarch64.rpm 6c51e2f10b7e5ef42f44fc326d668f99fdd874ad3a4051e5c8edf759925e915e qt5-qtdeclarative-devel-5.15.3-1.el8.aarch64.rpm c211e747bfd8fd70d4ef4c1fdc1f682bbe34f66b925fc51f5b6d53e0dc2f1973 qt5-qtdeclarative-examples-5.15.3-1.el8.aarch64.rpm 3feaa58471c9914c11dfacf2acfe6bc71316b841acb02feac853f4352a8eb6cb RLBA-2022:7491 qt5-qtdoc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtdoc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtdoc-5.15.3-1.el8.noarch.rpm dac6619086ac617dc01cf5853d55c1c0f772321db93c1e5a16fde1af92415d5e RLBA-2022:7492 qt5-qtgraphicaleffects bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtgraphicaleffects. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtgraphicaleffects-5.15.3-1.el8.aarch64.rpm d01aa360e40f150b057f451e3660df3ceb246346a82ffc635404e9b64f77a0ea RLBA-2022:7493 qt5-qtimageformats bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtimageformats. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtimageformats-5.15.3-1.el8.aarch64.rpm d869bd9c12525c74b121d130168e7b05b6c35307d07828cf208ed8772687c760 RLBA-2022:7494 qt5-qtlocation bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtlocation. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtlocation-5.15.3-1.el8.aarch64.rpm 1b1ec788743fed35c0e55099bf7855286f2b7f9c3d3bbc8989b48960f50e662d qt5-qtlocation-devel-5.15.3-1.el8.aarch64.rpm 0afe213c5eb287eb1c6f052b1a34693b8236f073c65f038fd62a71fb411fb484 qt5-qtlocation-examples-5.15.3-1.el8.aarch64.rpm c758323853cb98dc97dc5af027964836424b40753c043eec826bf488ebc9dd82 RLBA-2022:7495 sip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pyqt5-sip-4.19.25-1.el8.aarch64.rpm 9e266588ed8bddcd22830e9eb7a517cb008fca5720d59a670984ffb1ac7fe304 python3-wx-siplib-4.19.25-1.el8.aarch64.rpm 6473ef420b0b900698688a466589614b779f3b82812349697e47a32dd756c72e RLBA-2022:7496 qt5-qtmultimedia bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtmultimedia. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtmultimedia-5.15.3-1.el8.aarch64.rpm 5f018806ac9a8db1734bf4be9bd1954bfce15811144d46ae75d79fc87ff89025 qt5-qtmultimedia-devel-5.15.3-1.el8.aarch64.rpm 4f6d761214010cbdf676be48dc5c44af51f7b3129861fe82543442819bd00c05 qt5-qtmultimedia-examples-5.15.3-1.el8.aarch64.rpm 61e279c3f4a35179c2b4e4e27e6c05c597607c042487071fe1cc1dbb3bc87c98 RLBA-2022:7498 qt5-qtquickcontrols2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtquickcontrols2-5.15.3-1.el8.aarch64.rpm b650d2d6a7dfb818229aabbe6f50a83ab9beefdcb4918d4380b030d51b4d2571 qt5-qtquickcontrols2-examples-5.15.3-1.el8.aarch64.rpm 6f53396127970fa9aa10baaaa24b9dfaf5b07e6eca26ea2ad853737a95d85174 RLBA-2022:7497 qt5-qtquickcontrols bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtquickcontrols. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtquickcontrols-5.15.3-1.el8.aarch64.rpm 280cb1197f9a55ce0fda6e1334e1359b50bdf9fe3073b9b04115036fcb10745f qt5-qtquickcontrols-examples-5.15.3-1.el8.aarch64.rpm 5ac36cc0a374724926f8b55d8ece3ae8e73ecdad3765932a958feb35a1e18e84 RLBA-2022:7499 qt5-qtscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtscript-5.15.3-1.el8.aarch64.rpm e2479874472be3a53cca1117f62b3a772c8ae3a7457651c8397a3a29364cbc8f qt5-qtscript-devel-5.15.3-1.el8.aarch64.rpm abb2f41e38b838542738fe8c18c2acead0154302528da227360187ea7802bcdc qt5-qtscript-examples-5.15.3-1.el8.aarch64.rpm 96ba89f9ffa5075e9a9fd1c9631abb9bb07e39b741afca26080cd24d3dff5727 RLBA-2022:7500 qt5-qtsensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtsensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtsensors-5.15.3-1.el8.aarch64.rpm 889b312cdffc8649ef33545a379ae7abf05d5674993ddeed723a000f39952d92 qt5-qtsensors-devel-5.15.3-1.el8.aarch64.rpm 4624e448b408050e08f2798986776c523f173029beda30d099508b41f5a21248 qt5-qtsensors-examples-5.15.3-1.el8.aarch64.rpm 93ccca115df663d8c2c1b65b357ad6b192e58e764cd9308f95e8283cb8b63881 RLBA-2022:7501 qt5-qtserialbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtserialbus-5.15.3-1.el8.aarch64.rpm 2418aaff78730dea8556c5a238eee6d11d1b891791504f3ef891cd942634b65d qt5-qtserialbus-examples-5.15.3-1.el8.aarch64.rpm a28758c444e5491758cbba5c2a98ff66d326a666c084a34de5316aacdc83410b RLBA-2022:7502 qt5-qtserialport bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtserialport. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtserialport-5.15.3-1.el8.aarch64.rpm 6378fabc125be6815c7bd575e1cd2bf2e526b35450c03cbe4462f0f1bf639548 qt5-qtserialport-devel-5.15.3-1.el8.aarch64.rpm e098b3937b7006a22cbe0617a9f3c44e6e8dc0ebeef15509a2aeef1a4ba92447 qt5-qtserialport-examples-5.15.3-1.el8.aarch64.rpm 1998ae296936f075a9ff08826efcbadf51305f7d151eae56d65a5bdb69027f6c RLBA-2022:7503 qt5-qtsvg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtsvg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtsvg-5.15.3-1.el8.aarch64.rpm 7b077e0fdc41eaa656d00499f6bdad123a3762612cf9a46e241b2ff59767b1a3 qt5-qtsvg-devel-5.15.3-1.el8.aarch64.rpm 69289c76047f38632c533b20e9a7bfa15b260342bb43f55da3c98c7789fec5a1 qt5-qtsvg-examples-5.15.3-1.el8.aarch64.rpm 5488116793bfd58558950c62a44114e8de5edac4a3e7065b7b9c5fef66760f70 RLBA-2022:7504 qt5-qttools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qttools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-assistant-5.15.3-2.el8.aarch64.rpm 72b9ae0e6e164abb913e9ba2c9611c8f91be12a09d20f5df7613704e9ec88b96 qt5-designer-5.15.3-2.el8.aarch64.rpm 3544ee2990f13f58db3d452a92f479ab62a9dc91601e5fabcb4de00112345b53 qt5-doctools-5.15.3-2.el8.aarch64.rpm bdfeeb4f7218fde35178a7d4a54dcefe2afa440d3ccc4f652f330ab5438be0b7 qt5-linguist-5.15.3-2.el8.aarch64.rpm ec7298a325291c5409f563f59d95d1d058db9395fcdaeb70b3bcb7bdb4dd4d7e qt5-qdbusviewer-5.15.3-2.el8.aarch64.rpm ac287482008b99c41d6f8ea923480fc37e010edfdd7efdc2044713a5bbf14cfe qt5-qttools-5.15.3-2.el8.aarch64.rpm 1694b4145282cbf782bd1cb296385f8cf80a4a8f21e8efda4ba277ee9f6092e9 qt5-qttools-common-5.15.3-2.el8.noarch.rpm e140fb61b2795542cea5ce5cb0de9bd011de07ba8f6dc709ca4df853d4c06e98 qt5-qttools-devel-5.15.3-2.el8.aarch64.rpm 34f765ba017b953cb638574df4293210052684b27b693b5cca6129c80fcd5ac6 qt5-qttools-examples-5.15.3-2.el8.aarch64.rpm ebfd99f33fc3b5d5dc8d320840f4eb9a1cf480d51e07def56acab982841cb8c2 qt5-qttools-libs-designer-5.15.3-2.el8.aarch64.rpm da7169bf2b64c451990b64c1f7185a6cece1fc069280d369dc1efb28c4e30dd3 qt5-qttools-libs-designercomponents-5.15.3-2.el8.aarch64.rpm 6cf0e44a80752aa58668068db7aea879078bcde7ce2af379ab30029cfbf3b2ef qt5-qttools-libs-help-5.15.3-2.el8.aarch64.rpm 438cfb06b2b5ac74016d8b78ab2e2e4879ef30a2d4f11802c5f91ee3b0b7e093 RLBA-2022:7505 qt5-qttranslations bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qttranslations. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qttranslations-5.15.3-1.el8.noarch.rpm 3016601e5aa44729d1f95ba152efce40c782bf555972e3e918a448f228409c43 RLBA-2022:7506 qt5-qtwayland bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtwayland-5.15.3-1.el8.aarch64.rpm 328c8c3ce4aaa3ceceb3aecba236998428f9e6e3fd8b0a1d01ef3b6a3e138d37 qt5-qtwayland-examples-5.15.3-1.el8.aarch64.rpm 55f8e026a6a5eec0c10d08e75fac4bcd08cdd4c7f0fca5d9e7dff251aa4d5840 RLBA-2022:7507 qt5-qtwebchannel bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwebchannel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtwebchannel-5.15.3-1.el8.aarch64.rpm d0a5d4f231b5ec365ea0718852e44e63cc1bb515a64e9b525438352cc391a27a qt5-qtwebchannel-devel-5.15.3-1.el8.aarch64.rpm 5dc7f56c461025cc22202cc7962c97fb62941a81045f11795d62f0ea7110394f qt5-qtwebchannel-examples-5.15.3-1.el8.aarch64.rpm aca3b10c99c4c13f710df0bca4d0cbf1f54cd5bc481060c660e69f05af0b5940 RLBA-2022:7508 qt5-qtwebsockets bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwebsockets. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtwebsockets-5.15.3-1.el8.aarch64.rpm 5ef4cdc4d04a659fac703d6064cc9ec7e8838d299d914a2aec5ebd53f9b891c8 qt5-qtwebsockets-devel-5.15.3-1.el8.aarch64.rpm 51146235fe0b2636b514589fe1c993f690e57adaa805ac98562f74fcd2027d3b qt5-qtwebsockets-examples-5.15.3-1.el8.aarch64.rpm 445544ca524bb0b56f275fb08e5b7f823c2c136656f763331ea45f6f6445a8a3 RLBA-2022:7509 qt5-qtx11extras bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtx11extras. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtx11extras-5.15.3-1.el8.aarch64.rpm b8c5a495c153005a58a19f1fb7adfcaa038ed4d13b8b8921d71a2f0c629fb983 qt5-qtx11extras-devel-5.15.3-1.el8.aarch64.rpm fe991ba0873cccdbe0bae8b43a472c2138ab03ec79bb4246aeda7c6323ab3cf1 RLBA-2022:7510 qt5-qtxmlpatterns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtxmlpatterns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms qt5-qtxmlpatterns-5.15.3-1.el8.aarch64.rpm f80a750f0efa6a2f73fcee50f93daa0a1d69d7d8b1593481479be8d9057ed014 qt5-qtxmlpatterns-devel-5.15.3-1.el8.aarch64.rpm 30cdb9f940da2d1a55112a41467ea546521247eee9985766977f2a6e15f5e4ba qt5-qtxmlpatterns-examples-5.15.3-1.el8.aarch64.rpm e027c4e9b3a25dd0a2744c5f63f382ae8dfff2cd60f7938cd881c3f907b7b1c9 RLBA-2022:7512 postgresql-jdbc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postgresql-jdbc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms postgresql-jdbc-42.2.14-1.el8.noarch.rpm ab35417ec6f0de396ecf11645cf9de6898976c6f26623d88af88fabb4129a410 postgresql-jdbc-javadoc-42.2.14-1.el8.noarch.rpm 61475799800b1fa962b38a45a989f4389e499d3f4fe36e601d36dda268f72173 RLBA-2022:7513 crash-gcore-command bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash-gcore-command. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms crash-gcore-command-1.6.3-2.el8.aarch64.rpm ce567430dd5fd56eba6bd8b6fee2c9f0af1e9ad537ff7c6d38f6144e66542762 RLSA-2022:7514 Moderate: fribidi security update FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fribidi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fribidi-1.0.4-9.el8.aarch64.rpm 7964d32719cc4394bad28738c243f34d3a19768d1983cf75cea778c30c5f38e8 fribidi-devel-1.0.4-9.el8.aarch64.rpm 1c57352f3cd516483fe75924ed27365c1b75337b6368a1510f7ab5ba4b23245c RLBA-2022:7515 papi and libpfm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpfm, papi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libpfm-4.10.1-5.el8.aarch64.rpm 0323339aafc71e11daba6146d5233f5458a86840fd910d924e6f5ef90424c846 libpfm-devel-4.10.1-5.el8.aarch64.rpm a4d29bffffd76f2dfe5ec97ddc043dbb4f7bd813e59139978b2ee95765fda53c papi-5.6.0-16.el8.aarch64.rpm 0f351bafdf0a5824f2af9e49d0e995487d6f5219a49b2134adf4238a35e28910 papi-devel-5.6.0-16.el8.aarch64.rpm 194433a1fb068f19bbdc719fdddd576b6c6401f7f9e098615300166de4ac1e93 papi-libs-5.6.0-16.el8.aarch64.rpm 23522efb37be09ada7b8c3fb99d92dc2b02e2ccde9aee39fec085444e0715103 RLBA-2022:7517 cscope bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cscope. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cscope-15.9-11.el8.aarch64.rpm c31cbb328965b2186547b4a8063dbed6116527a950b3835ae4d45aca7226a1e1 RLBA-2022:7516 oscap-anaconda-addon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oscap-anaconda-addon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms oscap-anaconda-addon-1.2.1-8.el8.noarch.rpm 75bac43c9f12ff5fd2444d0203244762838868a9eada5355269c9e0259a0e14c RLBA-2022:7518 dyninst bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dyninst-12.1.0-1.el8.aarch64.rpm d312d48c2148c36e401c7b7369367eca9f3d50bd6c32ca0235177de4100db911 RLSA-2022:7519 Moderate: grafana security, bug fix, and enhancement update Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grafana. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055348) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms grafana-7.5.15-3.el8.aarch64.rpm 33c3813be0d4fbf060a90037e6eda2ee918db1056ef00cd765781df4dbe04b53 RLBA-2022:7520 fence-agents bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fence-agents. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fence-agents-all-4.2.1-103.el8.aarch64.rpm e5268c420d6c7a589b99076d3686592e0418056f7a069b53c72ba3b2b96d13fa fence-agents-amt-ws-4.2.1-103.el8.noarch.rpm 3ce7796c1b72fc99bb8b651196b2c66272fb0934eb7a47628935a9680a9ee392 fence-agents-apc-4.2.1-103.el8.noarch.rpm 03b96adcf7b6b23947608429663653d8f36e12bd93f22965b01ff04907768900 fence-agents-apc-snmp-4.2.1-103.el8.noarch.rpm fc8242c43925467482603f14189ccc96392561c7b444d8388dde3e1e9f0508cc fence-agents-bladecenter-4.2.1-103.el8.noarch.rpm 02570e8d92bf5b2f01166bfec7a2d4da4b410b0cd95d6fdf8ae332156891efbd fence-agents-brocade-4.2.1-103.el8.noarch.rpm 73d3e127cdab2dd2678da360b7a21fe7f080f03dc7978d53393d7eb25a2bd274 fence-agents-cisco-mds-4.2.1-103.el8.noarch.rpm 79bba3b89457f2ebde56ff07c236fc499a4a06f308f6250b085eeaae8101be55 fence-agents-cisco-ucs-4.2.1-103.el8.noarch.rpm 9418aa0750789ef08823a0f4629f44d48db5575115ca46b511b97ac8b9c460de fence-agents-common-4.2.1-103.el8.noarch.rpm 5a43c017ed93f80dd71581da79f2ed2851bc48374857f282bc8860dcadc1f926 fence-agents-compute-4.2.1-103.el8.noarch.rpm a18fcfb155cb2742c33a0e837ca3df2f0292e9d1d3eceb8875f3fa972afb15c8 fence-agents-drac5-4.2.1-103.el8.noarch.rpm 9f1faad3b7ed178a698ca70c51279d178d0c22b46aab20081872248580326a48 fence-agents-eaton-snmp-4.2.1-103.el8.noarch.rpm 1271a18e7ad0791c76ff5aad0bcdb31914f26f6f4dc147f77670c52ed29b4632 fence-agents-emerson-4.2.1-103.el8.noarch.rpm 2dc5b8b4ccc72e61f7d073da13341c5d998aac2eb72b55bef70504bea2b7c94e fence-agents-eps-4.2.1-103.el8.noarch.rpm dd323b8c343c479947b93e98b3c71873c3fb8607a99d06816b36e8fe5ee8f3e8 fence-agents-heuristics-ping-4.2.1-103.el8.noarch.rpm f737e418f3b093da281437b9f79dd92d0565f0a2f64c1b0b8a5996df71d704f2 fence-agents-hpblade-4.2.1-103.el8.noarch.rpm 1f979e340c291570cc5f32df9c2c0f6037c251cb0a045d0068d5a67e916adbf0 fence-agents-ibmblade-4.2.1-103.el8.noarch.rpm af3d02b14d3081309474639ede715cd2f7d3f6072641c7d700a6a4b9a3d325a5 fence-agents-ibm-powervs-4.2.1-103.el8.noarch.rpm 42dc1db7cd61928a962b04460470130383607ca82c380a2c5e44ebdadd0c525c fence-agents-ibm-vpc-4.2.1-103.el8.noarch.rpm 0c87a64a71b9d8b1cda74ab174ff8cb613fa19c642c21d4cde321f6b35de84d3 fence-agents-ifmib-4.2.1-103.el8.noarch.rpm 58e6a2fdbe3e9d7194e5403ed2560c6f4edca37a3bbca66ea82d3828b48aeff3 fence-agents-ilo2-4.2.1-103.el8.noarch.rpm 0955ab63e59343c483525b6fa09bcb4954666086029254c44174891167e7089e fence-agents-ilo-moonshot-4.2.1-103.el8.noarch.rpm 24098099cd95d917de58766fd040cba01942f97e9b0509296eb5d25d9a95a443 fence-agents-ilo-mp-4.2.1-103.el8.noarch.rpm 3d4a43190dcb56fc538b3a6e9e349ba747e39929d6907ab8c97f68b90474fa21 fence-agents-ilo-ssh-4.2.1-103.el8.noarch.rpm bf763b2d0385b2e01065b35385b3fb909ac59bf48068495980035eed44a4555c fence-agents-intelmodular-4.2.1-103.el8.noarch.rpm 0b13c96a0375ea1dc5790603eefb34550396d8f59b4c329d12373fede46ee79e fence-agents-ipdu-4.2.1-103.el8.noarch.rpm 34d75540f09eb789898492d8f8719a61fc78bbcaae721b0fe1f42279b3cff80a fence-agents-ipmilan-4.2.1-103.el8.noarch.rpm ea8597775ff0aa34d12de666cec3230117acce02de240758613c514ceddb30c4 fence-agents-kdump-4.2.1-103.el8.aarch64.rpm 4de4a3a65eb52cfcac3ff1bcebb872a50d6e4e64cad28d4b03323578fbd7c656 fence-agents-kubevirt-4.2.1-103.el8.aarch64.rpm f07802838751aa8633772f358aaa66cb148227b15bb30d9ae4f41943a6d3c9e7 fence-agents-mpath-4.2.1-103.el8.noarch.rpm df48090184b093f37bcc05d6021c67e9bdb4c66498c1bd9d50b784d7b0710c92 fence-agents-redfish-4.2.1-103.el8.aarch64.rpm 974815f2e85df55a2abd63a64de89906435fa791b0a5b01fc5cc85ebb8616f35 fence-agents-rhevm-4.2.1-103.el8.noarch.rpm 55e637fcc0537d56fd2cbf4b3125d77959e0607b6a045cc462be3b408336e03d fence-agents-rsa-4.2.1-103.el8.noarch.rpm 7a7ebcfc117cac222693a822452a0adc7d844bc85aa8a05d377c98e91ac9789a fence-agents-rsb-4.2.1-103.el8.noarch.rpm 238b7b85a8005b6f7b9bed745e26595d0c624ddd322ca03ac5fbd89998f30626 fence-agents-sbd-4.2.1-103.el8.noarch.rpm 9c1889a795da3dfeaaa4dd6191a2740ccf97f5faa7de3924f356fa3529f6f87c fence-agents-scsi-4.2.1-103.el8.noarch.rpm 3f9fe935d6d472a3f979e15511f4426b639f2b70561a45e24755c3c8ba56b55a fence-agents-virsh-4.2.1-103.el8.noarch.rpm 08a3f2ad0be57af41e86cdc0e6509f3857f1e0c63357f086d4714b977bf75789 fence-agents-vmware-rest-4.2.1-103.el8.noarch.rpm 3057ef2b1dd858a1b174731a3cd5dc33cf5ccba2a7dc8d2b0c24273c0a60ef9b fence-agents-vmware-soap-4.2.1-103.el8.noarch.rpm 38c303fb36b35d97d356b657f8a5e0dda0c3b9630ff197c0db53284f48e69144 fence-agents-wti-4.2.1-103.el8.noarch.rpm a2919d9609a4ad93b5a979a1db3ac3741d88527a7058b41d854e9b5afa5c8341 RLBA-2022:7521 tftp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tftp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tftp-5.2-26.el8.aarch64.rpm 91cd12ff5337718b95691bdfdc3d06e333cdb9c0fe36249d31bf96605ade6f7d tftp-server-5.2-26.el8.aarch64.rpm 143c00031367e2faed380e9c343c2d76ac8eaaff46eb57489e0c70a96bb5694c RLBA-2022:7522 go-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for delve, golang, go-toolset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__go-toolset golang-1.18.4-1.module+el8.7.0+1073+99e3b3cd.aarch64.rpm a83586f4d7210b5a0533fe71dda0f70faaecb06c9f8b0b5fcee706d200ff0a1c golang-bin-1.18.4-1.module+el8.7.0+1073+99e3b3cd.aarch64.rpm 1a14a4a774236ebb8512cc3bcc7a680a001b2394189d061c120667c847c1cded golang-docs-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm aad0c28a7e3554ef9114efe3c09f666c373eee0555d496901603c58b355fa548 golang-misc-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm 2323eab968fe9e83c7219b8d635140b28f41beb2dcae9e4034a1517c578afd19 golang-src-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm 972eeddab4835df47dd7f5077fa147f82209aa9fcac4c13aa1c29c962d288784 golang-tests-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm 5455050e157f67ada49c9f0a77fdf0b5156786f77980a649d1b659f84c933c7c go-toolset-1.18.4-1.module+el8.7.0+1073+99e3b3cd.aarch64.rpm 495a9ed18a3c2e8298c703f61f60074972cb3af25a197f3be7d5cb7676638b98 RLBA-2022:7523 cloud-init bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cloud-init. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cloud-init-22.1-5.el8.noarch.rpm fefa78c128171f878fedba5f9d823e1ee6e0fc435779389c25d0c040d31f366a RLSA-2022:7524 Moderate: yajl security update Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for yajl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms yajl-2.1.0-11.el8.aarch64.rpm a9b81a6f065c467fc092274e67722ef72c677e0165a2e189df0d133f5c45b777 RLBA-2022:7525 valgrind bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for valgrind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms valgrind-3.19.0-1.el8.aarch64.rpm 23d64b5aae17feee0a084e126099e055c7fdba6452acb2e5d866c46e5d4b05dd valgrind-devel-3.19.0-1.el8.aarch64.rpm b1a43b9f8183e94a3163825b44029bf9cd09d1f191282c246fcdf0ff26264c3a RLEA-2022:7528 ruby:3.1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rubygem-mysql2, rubygem-pg, rubygem-abrt, ruby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__ruby ruby-3.1.2-141.module+el8.7.0+1081+f0a69743.aarch64.rpm b09a7a791949ae2083fc0986a0d3494cd5ab54fabe0eb3d55294a3d5323dc0ad ruby-bundled-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.aarch64.rpm 8c6427b326824c601edb119355b7f25f4a9a50aeac34b2167178576cf2a97d81 ruby-default-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm 7c18a028426d5f9b2d86b66097c13afcde26de6a14c116ba951cd208d3979cca ruby-devel-3.1.2-141.module+el8.7.0+1081+f0a69743.aarch64.rpm d8917eafe1baee1827548b80e19031fa9328262b94f24c71a3ff0613298dc993 ruby-doc-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm 391d5027e0f209197b0e1d31e841f7c41a6399e1e74eac695f285f02f723f812 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm b87fa3bda0f1faeaa514ad4bec4851aab81079fafcd2c313b5673b939875cb6f rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm 45558f061b3cc8fc9d24a27e5104149a895ac41b422c0ba1e61833c43adf2939 rubygem-bigdecimal-3.1.1-141.module+el8.7.0+1081+f0a69743.aarch64.rpm c0e09cbd047a634363afd3f188c435c9acab2833e2148d53718fdd92c30297fe rubygem-bundler-2.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm 806611bac1cab60e9f1c70c67b7e7230acdeda7f88fdf55f39fce4a126144ad6 rubygem-io-console-0.5.11-141.module+el8.7.0+1081+f0a69743.aarch64.rpm a7c744d16cf035c27559735fabec8a41af7a12454df81a94d30180dc4c0cb2bb rubygem-irb-1.4.1-141.module+el8.7.0+1081+f0a69743.noarch.rpm 74fa0e47d61a7d62c8b5fa088bf9afa8a98b1e01317b8964c43580d3dfd11465 rubygem-json-2.6.1-141.module+el8.7.0+1081+f0a69743.aarch64.rpm 1d511d66ed18c004873a7754916f7174371d4d92b899c3babe24e5d5db9d2701 rubygem-minitest-5.15.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm a34a35947e355bc829b933b39727c62727328529dda780d5722a6b928ea63e9a rubygem-mysql2-0.5.3-2.module+el8.7.0+1081+f0a69743.aarch64.rpm 61da45a827c7b26ec4c432fbdb8611f81a49a1abb42f5fd025fddb927c3d76c3 rubygem-mysql2-doc-0.5.3-2.module+el8.7.0+1081+f0a69743.noarch.rpm 39cf4908e356cbe0c00cb912ed37adf012ede109ac04721c631bc82efc020c6f rubygem-pg-1.3.2-1.module+el8.7.0+1081+f0a69743.aarch64.rpm c8b85852643349f0334a3c204a559a01f31033fae85f26d95c90eadb5e67f1cb rubygem-pg-doc-1.3.2-1.module+el8.7.0+1081+f0a69743.noarch.rpm 959c9b529e593c5c51bd65597a55335cc9acb3c13ded0545b022d44ba45e7b4e rubygem-power_assert-2.0.1-141.module+el8.7.0+1081+f0a69743.noarch.rpm 1cc6ad1c8cf12f603a078784250d368e5444e231ba4e21e87d28f19dd7726d85 rubygem-psych-4.0.3-141.module+el8.7.0+1081+f0a69743.aarch64.rpm 9be6311fd9625cc3e7c8357703f55f827a6332a23ef7adb9ee151c04650d503a rubygem-rake-13.0.6-141.module+el8.7.0+1081+f0a69743.noarch.rpm dc465a415b7c7f809635738dc7a89e08d974e34fd5a8ff578265a460311ee4f2 rubygem-rbs-2.1.0-141.module+el8.7.0+1081+f0a69743.aarch64.rpm 09f360f252fed70fc8080b6e3f1f392b4a73fae12394372c0c9dafada4a6bf5a rubygem-rdoc-6.4.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm 266282d7a1fe1d6f7b9a8720e84d96c637795ed62b4c7b7986f41c3cf270deaa rubygems-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm ed88a51b43339ffc8199bc9b8c4ec1756ed1a702bc936bcb980cf648e5785b4d rubygems-devel-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm e625021ebd94e59dbed04148f68ce9bb7eb49d39e3359054de0f8f8e4f11943c rubygem-test-unit-3.5.3-141.module+el8.7.0+1081+f0a69743.noarch.rpm b857b6b967535592300725d3e6cde4a4a62549354903c9a8445132d3b7742209 rubygem-typeprof-0.21.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm 35b740433ac48b0a64d2c83dba9d6cbcf56a9e18b9238285c48a17a2d243b556 ruby-libs-3.1.2-141.module+el8.7.0+1081+f0a69743.aarch64.rpm 2e19fcc50e446ee168636fd9989214ef02e85a3ae7cad429e3ee9c374315b653 RLSA-2022:7529 Moderate: container-tools:3.0 security update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fuse-overlayfs, container-selinux, udica, runc, toolbox, podman, conmon, skopeo, crun, libslirp, oci-seccomp-bpf-hook, slirp4netns, containernetworking-plugins, buildah, criu, cockpit-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__container-tools buildah-1.19.9-6.module+el8.7.0+1076+9b1c11c1.aarch64.rpm fa94dfa4d63b67ba15101a37566ac10a4caff3003a4b6f3da81fb406fb98c432 buildah-tests-1.19.9-6.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f9304ab3a67ad8ebe9f0b9bc50f44a45a5eb1576cbdbc79b7141fd8e75679526 cockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm 65e2955119781a582b6d0c1af73b30e4ccce13635a0994a71abece1e4e0fa0a5 conmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 0880ca163c08d71f4effbda997938a25c3080cc93e7c864d4c76fb2b40956c92 containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 1a3dede123287cfe6f58b0eb2b8cec19b45e1ac020951201fa0c4282dfad7f57 containers-common-1.2.4-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 8a3d155beb2a83bcdb873bbff0c33e1f803b12c1091493e531463fca6b21f133 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 82cfa0ef91ed6db5389d3e1d570086625220fd67df08b249c6fc4107f3f1cf08 criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c06ef780c673286d10673444408aa87d7e395a61d542d10c47c6bd80a9c363e1 crun-0.18-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 912586617853c37e9ddf8b951bd72f35172fe0452673b4a771ea9ab9cfde74c8 fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm b66cbe9486670dacdc7e8c5899a5c54e1a230cbc3f4dca845564f0c482bcc966 libslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 93415230c6c3b4148744cfd9be8f51c08e4f9b5a4fc6a48344539ce9e4c501ed libslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm f29849de011cc80e346db27086800c5f2ccaafc3d85c53aa9557d9152a134304 oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c8bce58bb8faf13610b8212a0398a606c723903d32cdd511d125a492d5140f26 podman-3.0.1-13.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c69a52ecd8758bbbf61e6971519909b3f157cc059ba0293232e4085d1c953134 podman-catatonit-3.0.1-13.module+el8.7.0+1076+9b1c11c1.aarch64.rpm c46130149fc275c771dc093d980b163227f6916f1fa1be7d028ed2cbd913c0ad podman-docker-3.0.1-13.module+el8.7.0+1076+9b1c11c1.noarch.rpm 13c17400ce1f7fd5be3064d31fc6df69484d37c18170fd99b6678f3bc8d6a3c5 podman-plugins-3.0.1-13.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 5e4e30f2cd0e32bc45f022cdcea6712e8d2d5d86f7199e882956bf4bca691637 podman-remote-3.0.1-13.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 641fb83012529e9648daaa49df5785d6e4b986d9ecb272dcfd4f96ac12bea048 podman-tests-3.0.1-13.module+el8.7.0+1076+9b1c11c1.aarch64.rpm a5b9b2cd97d8812a3e699c8ba921c747e4a792f3d695307a5bde3a9de6fda544 python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 61c6041e8376e4bd3fcf5b5d47f70b9fe9eecbc89b4aa4205aa14c573acf426e runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.aarch64.rpm d265cd7a3d56fd2b95918ff1066f55d950833d6fbe7766873f7e4ead8d3b3fbd skopeo-1.2.4-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 230c0cb732169780e0e38768d12818c3fb8f2223270ee29328c04e406bcfd3c3 skopeo-tests-1.2.4-2.module+el8.7.0+1076+9b1c11c1.aarch64.rpm e6d6dfee385f5feca24e04157091f1f858401dcb5e9581aff31129d340547d6f slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm 662f9a53dffb141237f710f900a954daf6add6ec70c35feedcc2a1703ba8c556 toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm a5b2c9bf2a92f9533b194472cf1d4a729879513b4796d3720b9ff97def54fec8 toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.aarch64.rpm ab2e6b9be7a0095f0c39f4b8da200833996f5c78628b8b7f3c3de1aeef9a6e37 udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm c58f2cf1e31f77bd46bc33fd7dd7b8268907bdcb4fd64024b982c0511310f87f RLBA-2022:7530 ansible-pcp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ansible-pcp-2.2.5-1.el8.noarch.rpm 43bcb96ad0f1f6b4ae28f31ff13c54cd6825024d27c1c919c25a3a6faa39194c RLBA-2022:7531 evolution-data-server bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms evolution-data-server-3.28.5-20.el8.aarch64.rpm 97810bc2165c65e90773c5c84028a4d6908bb44861358a29bd44ce5a337badd6 evolution-data-server-devel-3.28.5-20.el8.aarch64.rpm b2ab3477632d420f17ebc1c312ceef2ca3c66c4226648c0410026ff3a173e173 evolution-data-server-langpacks-3.28.5-20.el8.noarch.rpm 833711b12ab839728adbb252c686beec45f3cc36bc29df3544cd83d9d159751e RLBA-2022:7532 evolution-ews bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution-ews. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms evolution-ews-3.28.5-13.el8.aarch64.rpm b16e3263afd2775d886956e669883ab40313fbe55a305fe965402a1d290bb50e evolution-ews-langpacks-3.28.5-13.el8.noarch.rpm 869590768476b712d0edec973c5345e50bb6fc0f89ebdb8033adbce7e151af6e RLBA-2022:7533 cheese bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cheese. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cheese-libs-3.28.0-4.el8_6.aarch64.rpm 5b3116e02058a9f94239bbf55d21405496178c777787aa39b222da0ff8ef3b63 RLBA-2022:7534 mod_auth_gssapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_gssapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mod_auth_gssapi-1.6.1-9.el8.aarch64.rpm 447fa0552c0dc74ad7dd69b8c4b4b46dad4645971fbd2adfcbbe3b347029ed1a RLBA-2022:7535 stress-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stress-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms stress-ng-0.14.00-1.el8.aarch64.rpm 3b87ef56ea29761e720d5925c6f97dcba076f6e484fbb5ab2340c79f814e3b82 RLBA-2022:7537 llvm-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for compiler-rt, lldb, lld, llvm, llvm-toolset, clang, libomp, python-lit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__llvm-toolset clang-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 0894f6e0feca0407c8ca432320d560c9ec1bba88a11f611c291a9fc910aa45f6 clang-analyzer-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm c7cfa90b4b5f897410dd6604f91d5cfd06d819898b250ab482c753eae78b0c5e clang-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm f44a152a148f565e1a80e4e1d995fa11878dccac9cb89d10e1df9b20d1835ebf clang-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm f17c035c4902bf17ff24bd59b516adb20ad832c81a4131e06334a4c80340ac5a clang-resource-filesystem-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 0569ed4a53d502b44abec31e61febe11628214dd79bfa22b4350bb410e69c454 clang-tools-extra-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm c03089443faafb4c944e42d80e53ef372afcbdc7590f99b390ff767354b0dc8c compiler-rt-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm e846d93ae1b34a6e541aadc91ed735f2a56543d7551d2285e52a302c5ad6ea59 git-clang-format-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 58bc14f474494b5b5f83860bb45f289d1186658dc9e35a7d90bb922821499003 libomp-14.0.6-2.module+el8.7.0+1080+d88dc670.aarch64.rpm edc9d2f346d70cdb964d355c62a956e9fc8559899160b86cf418f2049d77e6b9 libomp-devel-14.0.6-2.module+el8.7.0+1080+d88dc670.aarch64.rpm fdd682de7b36f59cf359ceff324836e15a039413396d9aaa969e431daac82290 libomp-test-14.0.6-2.module+el8.7.0+1080+d88dc670.aarch64.rpm 6e984bce240d58fad83f26bae6fce58a2a914c618e96557f3aa77c7b5d148a98 lld-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 5a42a9fdc2c06b016db60d5096b27aa1f58d268b6bc0b4cc371ddabcc21fa08d lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 35755a24904e4a5b88481ff5c02672615405503b986ee355797d4a47a6a6cbb6 lldb-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm e5dc91d1a6d3b2f317f480bc3da1c4a439115ab4fb0c8483afab52c119d3f628 lld-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 084584aabace216853011b028b8a5f13489558b6b0c4771ab5a087981017108a lld-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm ffdc861dd24d69e699b73e73ef01a79c1fdc7f3341f5cdbac2f0899ddfb3a5ff llvm-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 0e6e8a47ad77d563049da2e4d0bf4f6b3fac85db4548a81d80dbd63e6fff1f6a llvm-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 4922bce90043bdae3fc0b8ca59cb78318defdd431517dda7813f3db9c3ab32f3 llvm-doc-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm c1be87e9a4dd7357f46fde9d36a86c311dce9162b400d08db28eb44a59d5b659 llvm-googletest-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 34aa044399593f997cb9d8f1fcdc9be8a3c60cee2e7d568bb44b53d26b58ac69 llvm-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 74df8a5da95dc330e73ad62110a49685494ebf1cab7ac8ef4c9494f9e308fced llvm-static-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm fbd2e0547b8b8a1fafd60a8848a8fb7265642f43e97b972a59e34e2706dd0f3f llvm-test-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 918882a67b159c1f03e927db9ada318d62572c187953f2e2a2996c2395e7c8ea llvm-toolset-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 6a1ac714d10664169d517778a3daf8b6fcab673b1a1ea6ce82683e5647133455 python3-clang-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm ea8f367cd194f637a952397fc4a99d931d344d8d3864b325ec9bcc3d7a1d6a68 python3-lit-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm de725c08eeb03c1304d6cb3942294deb8f5e2c3473cacc6c2d5e77c54550d2f0 python3-lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.aarch64.rpm 27c7f9ee43f2375b707e1c0a275abb0e82c2049af6d41092cf2627bc1720eb33 RLBA-2022:7536 nautilus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nautilus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nautilus-3.28.1-21.el8.aarch64.rpm f0fb4e42a39424aae345ab0476347738f3e810f413c7f28502410ad081a137b7 nautilus-extensions-3.28.1-21.el8.aarch64.rpm 9f959092069f7cfeefb5a32f669fa10e91a753891a73ee3f0885415916bcdcc5 RLBA-2022:7538 systemtap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemtap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms systemtap-4.7-1.el8.aarch64.rpm 5d4b39938ff4adf592bcba46647071e0c4b090293224eb961e5e33c09fc80b5b systemtap-client-4.7-1.el8.aarch64.rpm 6c0c39a2be5d7095f99f5e4cef1e22edf3b6c8997181ec052d373f4af41cdbe0 systemtap-devel-4.7-1.el8.aarch64.rpm 7e2c7c936aec5672481991c2d955a13c08c257c1a96fbd561cfdfe801ff02dea systemtap-exporter-4.7-1.el8.aarch64.rpm 561fde73fd11b4172a9dcef864c6c47e3136f92006018b994ba811b7e512a982 systemtap-initscript-4.7-1.el8.aarch64.rpm 466de9f962b446f0927d6884cdb7cf9a6108bdb91ad84bc68604b8a60c2cfbbe systemtap-runtime-4.7-1.el8.aarch64.rpm 5580cefc785a44e849d1d27fafdb01c8345a4bbdc8df9c1ebce8a432db7455eb systemtap-runtime-java-4.7-1.el8.aarch64.rpm 3760f9eba024be101416569168a0825c0486f134ab10c9e477b78540278a5062 systemtap-runtime-python3-4.7-1.el8.aarch64.rpm 662e89c87d36d9a9ec2df2c8779a7132a192bfef98ab9980555a6202569dea66 systemtap-runtime-virtguest-4.7-1.el8.aarch64.rpm 0b84b934ad487659c40575a18a5745d688429a7fa2d263f43ac5d0ab1f6a76ea systemtap-sdt-devel-4.7-1.el8.aarch64.rpm 1f09bbc502ab17f7fe704cecab99afb586f9a2d8c7603ffa7a1f70fe272e7a52 systemtap-server-4.7-1.el8.aarch64.rpm 0ad0990fc85d6402366ce397274854f7b4d4f42613c28e364d4ed5b80249db22 RLBA-2022:7539 libgdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libgdata-0.17.9-4.el8.aarch64.rpm b4318cbb5a649f49f67bd7e47f0e134793b1aa0add79f8d197a91102310415d9 libgdata-devel-0.17.9-4.el8.aarch64.rpm 78757fe82332d2662eed14ff48fd692e0af4306e63faa984efa3db61f8cd2e32 RLBA-2022:7540 idm:client and idm:DL1 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__idm custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce ipa-client-4.9.10-3.module+el8.7.0+1074+aae18f3a.aarch64.rpm a85e41985267cf895e50a72b0f528b9b8b7f7a5f3998bd9480285df6f563a072 ipa-client-4.9.10-6.module+el8.7.0+1075+05db0c1d.aarch64.rpm e90f9d3fcf7d2594d06af3f23dec7643d0e45ba41da5a68249a40af6a8fcfa07 ipa-client-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 479f6dfb3c17e9ddd5e6dd9eddc39dc18b22f2c1a864a9bffd6a016f58746853 ipa-client-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm be705b636f081a46557f91a42295f0b6723afc20e6d6a857801ae5de9a50c916 ipa-client-epn-4.9.10-3.module+el8.7.0+1074+aae18f3a.aarch64.rpm 788604523fc6c978b8f6099858fcbb5c1d80a9d0205b175d21978b5df80af094 ipa-client-epn-4.9.10-6.module+el8.7.0+1075+05db0c1d.aarch64.rpm d8783fa18dae231cf3c82c782ff90f77b70542ddebb0e06b4493cbd7dae104e0 ipa-client-samba-4.9.10-3.module+el8.7.0+1074+aae18f3a.aarch64.rpm ca2ee789e4c9dcb6e7b2a46db4a1f1d1c1dd9fab2907f2e89bc388390daffe8c ipa-client-samba-4.9.10-6.module+el8.7.0+1075+05db0c1d.aarch64.rpm fee5f2321b2fe63ebc5989f1fdbf9da4d917e922c959991252633152a95a045e ipa-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 0273528be5542e496c224410b196f75f80c96cccef8aa50fe877ba3fd6f4eb67 ipa-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm a484042a3bdaa281429a752ceddc62c907108424d45d26dfafc0b825f3ab30cb ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm e273335ad4d42c167d380d2367e199f7b7df5b251a42c3fea602770a842f11d2 ipa-python-compat-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm b5a9bf5a66ec43167636748169c35dc08ce9a994c75d086845122b4e0e0a5963 ipa-python-compat-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm f35a45b4365fcd63d1b76dc7435583b46cc62ba801cbf6bca35424fbbfe4b134 ipa-selinux-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 99e090241440e24a10743a9d147cb5587ea5070d5f2c80010f084227978162c6 ipa-selinux-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm e6840a613c1508d6fe34ec27f01393023c1f544dcd1dc82ae94fd948b4726418 ipa-server-4.9.10-6.module+el8.7.0+1075+05db0c1d.aarch64.rpm 0313545c371de3395feb13fc782dc99ed5d6a03d2a0a74647d25d29d50ddd0d6 ipa-server-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 37ce4afa670d0d9d679469784430214a26a99e4467f44bf95f9bac93a40981d3 ipa-server-dns-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 0ac3f88ce3777ead8b97da89996d655031feae8f763a133333d2dcfd18f01fb8 ipa-server-trust-ad-4.9.10-6.module+el8.7.0+1075+05db0c1d.aarch64.rpm 3e5e07c370da705241d091161bccef9d377380bc91f8a6d23fd261471ed45b7c opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-ipaclient-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 3e7844d1fa36ccc39d5f9445b6cc262109f335700db911876aac545604841291 python3-ipaclient-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 53738c5f9fa3149863f05ebf49f004a74c3d178d9bea2ee0a13403c8391a473a python3-ipalib-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm 67ea7a4ddb5203008f69586b9ddeef4deb164c556a4d97d00ec7ec4f5c78e426 python3-ipalib-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 04143fd2b11a26b201ca14442663c41ac21c00c325b41cd7e911da5f531506c0 python3-ipaserver-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 92eac700748418bf37fe61a1068837cf4c24c2dec304f4f62a283dbdd9a91aad python3-ipatests-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm 81e12d9e93633047cda161a6b096361b7a521cd848f545b83022df803cbc7230 python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 614fd471d5b1912f23791f8b533172d92d1c6b27d504b4a900180f83d7e8c37f python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm c5f6dfd01f04862214fa2f092a4574889d903e9a081cae92ead60cc020557baf python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 python3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 94698890dc8f5935b11ac8d3e2cd070ed0095cbff39670a6a09638b03045452a slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.aarch64.rpm ed646e8ed3419d164176a4a1397121337c4eae0fa9fde9ab95777df614661a50 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLSA-2022:7541 Low: redis:6 security, bug fix, and enhancement update Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873) Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for redis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. The following packages have been upgraded to a later upstream version: redis (6.2.7). (BZ#1999873) Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__redis redis-6.2.7-1.module+el8.7.0+1105+8815ce78.aarch64.rpm dcf60f123e235e74a3a6f8b7e3e10bc209e236f23e3f01a3b4677a9a95f19de9 redis-devel-6.2.7-1.module+el8.7.0+1105+8815ce78.aarch64.rpm 4102219541bf267283dcb3db0eb1cb2fd36c68bc38b62069af174582a129bc2c redis-doc-6.2.7-1.module+el8.7.0+1105+8815ce78.noarch.rpm 7bfd99fe21b4a2ac911ddc70db22e0e4bc0ac484a0760bd596fdf3a5daec8524 RLBA-2022:7542 subversion:1.14 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 mod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 53355e93019a37210bf92863078a3b037ed999d2cab8caea12916fbb493a2d2f python3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 812baa7d0c02e17c5af8e2692440f40eda8e513ae75e3d7f070e789c6a836550 subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 2fc884f159b7e5d388b84225b24c401213ad541f9a2a4f620e375505b2694902 subversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm bb91d6b4c252c7cd1acb4dbd292abf00efd4a972945d6021fc2a65268d3d0634 subversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 4a273a7e7dfd10ccf5d292721be2bf1b3d4eb906a0625f8a1cd75e6cbf39c3dd subversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm 911dd1adbc2b2cac43e6114aadfc7a825121a1e4211043c26c97549ab1495e75 subversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm 27bc8af5f90d033103b00d1bbe2b600acad0b46c750369c5dff894019af92e7b subversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm dc4dcfc8bffc1f89629e7929492c5e7906bfa39dbe1d7d5c951a9f4881ed5c3a subversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.aarch64.rpm b0d8c23c396ac5c2dbaeca3553fbc87205c4b8dbeff36038a06b4dc37f324df6 utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.aarch64.rpm 4c4d776a27d03f80fdd4dddb4f0afeb79e2998ef7c754bc1aeef34cb7ac6ffd5 RLEA-2022:7543 subversion bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subversion, utf8proc, libserf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__subversion libserf-1.3.9-9.module+el8.7.0+1065+42200b2e.aarch64.rpm 6db41084310c21497c751404c885fcb3ca5f3b17004fc9e576a53f6318e2d5f7 mod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 1fec5b0fbe7cd56808db1debe0c83e67bd6125ff7434e697dfaf81385f3db818 subversion-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 0e39e420e746701a8e6b1577927d66db8170bf4a2b977e0ce0814dd0647ee0c2 subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 6f0d927e107c35f15de2616b627b69af6c58a3dda2eceb38f43be47997446054 subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm a541196c25e7eab93b949a43349266ac907daf176103e627890b8dc6f3ad8693 subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm 173765bd35da01cbad3cba259410b0fe81e32cfe2efb3795e435403fdf4029e5 subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 48ebe5d4f06577192d72ae2e27637833b8d59fbc22d6187a37f29245f5ca38b7 subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 624080775aac60df5387c43149d9d74611de91f27c1002f0f1d9a2e49de7ad63 subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.aarch64.rpm 82f30d61ad53ab64d99da2f405a5733954b087deb6a57f17d301e6f4ae565c71 utf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.aarch64.rpm 4c4d776a27d03f80fdd4dddb4f0afeb79e2998ef7c754bc1aeef34cb7ac6ffd5 RLBA-2022:7545 zenity bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zenity. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms zenity-3.28.1-2.el8.aarch64.rpm d5c82dc9890795d4f231e2d21b14e5126eba5b708c47985d271fd4d89e6d7584 RLBA-2022:7546 createrepo_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for createrepo_c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms createrepo_c-0.17.7-6.el8.aarch64.rpm 37f89bcc0718f67771a1954af71fbe4f7ebe9789567ae0515986a50bdf6edffc createrepo_c-devel-0.17.7-6.el8.aarch64.rpm 97c1c5b684605e06c5ccc52b0d6ae4de0c0638131e5e56cd27960d5a298e5614 createrepo_c-libs-0.17.7-6.el8.aarch64.rpm 82a3501eab94f56d221ec9b47c20e00f896c25bade99e9b02191b947c8f657ac python3-createrepo_c-0.17.7-6.el8.aarch64.rpm 9bf0fafde76cc7b26c9e51e10262276963c1ae8284e508e077c8e14799eeb96d RLBA-2022:7547 gnome-shell bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-shell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-shell-3.32.2-48.el8.aarch64.rpm 0fc33b461dfbcb53275499128810595e4762bb3c0d06e860f117ffe86b73f1a4 RLSA-2022:7548 Low: Image Builder security, bug fix, and enhancement update Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for cockpit-composer, weldr-client. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cockpit-composer-41-1.el8.noarch.rpm d7bfe1373b85cd1f91ede9e66071d02acf3fe71c634101e92a2c5368adf4a546 weldr-client-35.5-4.el8.aarch64.rpm ebebdef97ddf01a63f4e182b0a1f866aa7f1366b8104fe246931fec5ef39f017 osbuild-65-1.el8.rocky.0.1.noarch.rpm c66df858d97a7bfb6f08448e4b46dd13a87129c13124b70e0b79ecf303061d11 osbuild-luks2-65-1.el8.rocky.0.1.noarch.rpm b666d99dc28d5a4d23f638ed26fc488d9700c2ac1eefcbafc8c751baa0ef7d9c osbuild-lvm2-65-1.el8.rocky.0.1.noarch.rpm ffbb5b12367dad592e26541798c773fc6f1229d6d19ab5c58664679d3f0e4cdf osbuild-ostree-65-1.el8.rocky.0.1.noarch.rpm 70651b8c479985e20ba1cc5131079bd742b7e5b4f898597bbce44010ba4aa7ec osbuild-selinux-65-1.el8.rocky.0.1.noarch.rpm c16458f41f87af49f4d67b8d92393feb069f7981efcca5383010db929e9f8666 python3-osbuild-65-1.el8.rocky.0.1.noarch.rpm 2d29649c59f6c1fae6565113431d1e679689b229b930a6da00f1d3e4d83ecdf7 RLBA-2022:7549 rust-toolset:rhel8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rust. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__rust-toolset cargo-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm a18ea35e2b72ac6aab3df963878da4abe63384b9417aa3a3270151c742ca02dc cargo-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm d5cfc7511803b28817230db889f64b64da8c8a85a7cf37a15d52ac0bd115089e clippy-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm ecab49c943cc7bd26af1d345ca0a0ae5c4d6eff6ac69be64793b3bb0ff3fba33 rls-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm 8c759b101671a11b93f2c8574d9f60ea8aa2ec7d6db1576041b919b22eeaddcd rust-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm 28414b0878635bc6c0d51bd09014a364c81f60323030a5486cd9244feea858bb rust-analysis-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm cd25d7ae48f848e984fc17d481046e452417390a7f53498fd2ae2c7306284e9b rust-debugger-common-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm 4192226b0a6cc7cf738391a14321c835225f3731b1b8fd654010475cab0a3aed rust-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm 909eef502455928f02f5a875b750691057c1c69b298c54d15de6adaaf2b45815 rustfmt-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm ad510154b88bfe2f3d452419d848d2efe105d3c1bfdba8637428dc2c0b0a83c2 rust-gdb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm 9b6abf4b2d05d55c5bf242364e319d0b04ed9d27ab6119ab0430bca381ac63bb rust-lldb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm a6c8e4cac0b76628ed2d5295bad5d5c149c45f046729c146e6d6dbf2a252edfd rust-src-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm 943a8bf08f99a073fdfc258b588cbf9bf6690cdd2987551ae03fdd476086e7e8 rust-std-static-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm ed29eb4f254daf27bb115b3b003670971920e13fb23c9f2b514b680fd6ad04c5 rust-std-static-wasm32-unknown-unknown-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm 5f163bab9f5521de08663b8d3c4fba548ef55678f04d325f6a490fc1152f5387 rust-std-static-wasm32-wasi-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm 6ad1659f63cdde9be8b5542b5eba7361454c16261a4d4661790dfc7d73c9a9e6 rust-toolset-1.62.1-1.module+el8.7.0+1079+7c7e1744.aarch64.rpm f6ad03cfcdc6a111ace9f78abeb277375add78425f7b3e1e10c496f2696118b4 RLBA-2022:7550 gcc-toolset-12 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-12-12.0-5.el8.aarch64.rpm 674b00b6f395d3e86f7f736532b03a178ee0ef8d3ac5c83a1ee9871e248a28da gcc-toolset-12-runtime-12.0-5.el8.aarch64.rpm 1398d881a32ecdd52bc0acd5452ac4d228d099f8e68f4b7471a98ee7979e2f28 RLBA-2022:7553 nmap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nmap-7.70-8.el8.aarch64.rpm 9f5b458fab2464c5cd4e6e3850f4635667f78bb03f7bdc0bb091076402d55b72 nmap-ncat-7.70-8.el8.aarch64.rpm f1baead8e9c6fa94cb6fc03c6372b058320cbefde77513ea37a801d067654d67 RLBA-2022:7552 389-ds:1.4 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for 389-ds-base. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__389-ds 389-ds-base-1.4.3.30-6.module+el8.7.0+1060+852806e7.aarch64.rpm 618535f7c3233b0ca6c9fc1c439626784226b67e409e4322255ad11412e44e46 389-ds-base-devel-1.4.3.30-6.module+el8.7.0+1060+852806e7.aarch64.rpm accc8b444a73bef88f474aa400f8014e6e5e71c36a654791f10e366c1c571f37 389-ds-base-legacy-tools-1.4.3.30-6.module+el8.7.0+1060+852806e7.aarch64.rpm db50a1ed9c3576cae8f024dbef97877e7adbe7dfde4f656be2c93362f5c36397 389-ds-base-libs-1.4.3.30-6.module+el8.7.0+1060+852806e7.aarch64.rpm 536ce72670dcf5f083ee7e43862aae1e51904a51b5d2a0c8024e86ec074a1ad2 389-ds-base-snmp-1.4.3.30-6.module+el8.7.0+1060+852806e7.aarch64.rpm a2829a8e22a997002a88c3ee56ae027677ee3d16f84e42ea14e39e7b6b6fdf09 python3-lib389-1.4.3.30-6.module+el8.7.0+1060+852806e7.noarch.rpm 01214606f2a6a7c6d1bf17fff3b1de0cead7e9c170d7161733e620766a744bf0 RLBA-2022:7554 cockpit-appstream bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit-appstream. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cockpit-machines-276-1.el8.noarch.rpm cb65ac78dafa8d93335587d0d7c1568e4025a79575fcd43bf0a7d4a93296dcdd cockpit-packagekit-276-1.el8.noarch.rpm 41f18cfc41073c69c14a5be37f22ee6143ec87dc812b7083489fc3886a5ee4e2 cockpit-pcp-276-1.el8.aarch64.rpm 5f22fd23ec952c1061711e2f342e02fb82ae82ec6706d3204a60ff87f255a555 cockpit-storaged-276-1.el8.noarch.rpm 9f2a640e294af651a88a7b05476cdaa8b2c4cd723cf41cb32cd54b601431241c RLBA-2022:7555 osinfo-db bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osinfo-db. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms osinfo-db-20220727-2.el8.noarch.rpm f02e51bc7125ee294eb4868d4b7b2fca55b41675ca738ee459494b2d5335c6bb RLBA-2022:7557 ostree bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ostree-grub2-2022.2-5.el8.aarch64.rpm ce099345f2d575e813d46f3c4e3a945583d70f4aa75f8f85ae376c04694b7939 ostree-2022.2-5.el8.aarch64.rpm b1178df578f7d8d0080adf20ee4f8f299db1d13888d8e458b8be103568602257 ostree-devel-2022.2-5.el8.aarch64.rpm d45f48e1255f3442187cf23c4f8dd28e7a54c584cb60459a05c0849216609d1c ostree-libs-2022.2-5.el8.aarch64.rpm 482559ac4478306b4c48da5d00978b54701c1592a34a4e67853c47b5001e8e97 RLBA-2022:7559 lasso bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lasso. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms lasso-2.6.0-13.el8.aarch64.rpm cdd7b812907c60db002857c108322e6531cc79c8b74bf904b33aa0af40734f4c python3-lasso-2.6.0-13.el8.aarch64.rpm b22e21dc065d9e960d7b4334f118f5d6bcbe7a3d0016e47a93987f01231a89e3 RLSA-2022:7558 Low: wavpack security update WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for wavpack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms wavpack-5.1.0-16.el8.aarch64.rpm b92c2dc5555dc494b53dd1636a9818cc4084ef4e573b750f9d673cf1158d8b70 RLBA-2022:7560 frr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for frr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms frr-7.5.1-4.el8.aarch64.rpm 8fb6ef1dc162d54d5377fbb027cffa6aa8bc55a4526db1b53d9533c39c3f0674 frr-selinux-7.5.1-4.el8.noarch.rpm 1b12bff8d2cd3ac2e31220ed59bf3d6cfe101821e1e7a731dd03584a9ad16fc4 RLBA-2022:7561 crash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms crash-7.3.2-2.el8.aarch64.rpm 3aec30ac614e50b1cd0bcb0034b1da9285a3006f6f472c93cb2226c20e579742 RLBA-2022:7562 mariadb-java-client bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mariadb-java-client. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mariadb-java-client-2.7.1-2.el8.noarch.rpm b12d6e24639f571185cb4e7dd799f25d24b080c106afcfe90f47043db27f9573 RLBA-2022:7564 gdm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gdm-40.0-24.el8.aarch64.rpm a61643240622df0d5f068314ea64667398208a4814b789a7115225c1edb82ee6 RLBA-2022:7565 gcc-toolset-12-gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-12-gdb-11.2-3.el8.aarch64.rpm 7132d4b38ca2fcb5e62050a662bd1d3d9e289a608e1321a4c67438001e219caa RLBA-2022:7566 kdump-anaconda-addon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kdump-anaconda-addon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms kdump-anaconda-addon-003-8.20220519gitffd365e.el8.noarch.rpm afac980b6ee480376777f6219d6257898213268326d399f54ca97d716421a13a RLEA-2022:7568 Rocky Linux-system-roles bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rhel-system-roles-1.20.1-1.el8.noarch.rpm afa41c37e83245af98b4cf2de70cbff146ab3098d215861487304b25ccfa2962 RLBA-2022:7567 evolution-mapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openchange, evolution-mapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms evolution-mapi-3.28.3-6.el8.aarch64.rpm 9bdfb2e24717990ea07c9a2675ce52e59424eedb1b620470f5d5fefb5556bdec evolution-mapi-langpacks-3.28.3-6.el8.noarch.rpm 92c162bdf2086d3155879a8959e1609ec8c866583c7ca466db05210440fb789e openchange-2.3-30.el8.aarch64.rpm 374a91545a56ae52206d467e9a4a00980d99e07ba9ce38029a49470312041ec7 RLBA-2022:7569 gcc-toolset-12-dwz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-dwz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-12-dwz-0.14-2.el8.aarch64.rpm fb8ff78feb69f0c37caf34794fcc759fb5d3524298fbc14de65138ad2b0fb2da RLBA-2022:7570 gcc-toolset-12-gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-12-gcc-12.1.1-3.2.el8.aarch64.rpm 368ebb502ea7a4dcabd990d5662345efba15908a77ae6b73864de0f4aead59ac gcc-toolset-12-gcc-c++-12.1.1-3.2.el8.aarch64.rpm 109bd5db65fa722fc724f38483a829d8166ec435bcdb8094c7c5b311e2684b82 gcc-toolset-12-gcc-gfortran-12.1.1-3.2.el8.aarch64.rpm 69e40e6bab8d3eb3b6cd968c451defcc630bc27eeb4fdb42ce5915373560b5e2 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.2.el8.aarch64.rpm 6c2d885fa64184e59c371814f0da2e7bce3f8ec6829334e67821670406de2e6a gcc-toolset-12-libasan-devel-12.1.1-3.2.el8.aarch64.rpm fc03355950651acd56971b635310209c1a0fa2b57ac0ce66f29e7746adea5b56 gcc-toolset-12-libatomic-devel-12.1.1-3.2.el8.aarch64.rpm cad1cdfc46826072e54d028e09fe32270123c4f314765b8c3884d4faa0ad9513 gcc-toolset-12-libgccjit-12.1.1-3.2.el8.aarch64.rpm 660ae122f3e508d43142d133636d38539ba10a256f31904cc44cf60626c58140 gcc-toolset-12-libgccjit-devel-12.1.1-3.2.el8.aarch64.rpm b20a75c8b4964ec43c7a305de4cdb25257b90761962524d66e5bd98f6b5780aa gcc-toolset-12-libgccjit-docs-12.1.1-3.2.el8.aarch64.rpm 1761cb5290277cc1763653450fe9ddbceb689af4f17f3445b324b94a1c38d03d gcc-toolset-12-libitm-devel-12.1.1-3.2.el8.aarch64.rpm 8ed1bf75639487b1c3ad42e76988f1f7277f531ef36c2ccef6132e6429fd0c7b gcc-toolset-12-liblsan-devel-12.1.1-3.2.el8.aarch64.rpm 3744e3b4114a853a963ccd7780438dc6bc1751a35f5b8d12bac1d594d6f73da8 gcc-toolset-12-libstdc++-devel-12.1.1-3.2.el8.aarch64.rpm 16903ddca4c3438991cd83294502957d631f1d376d1e50f3e7a38ebd877ff663 gcc-toolset-12-libstdc++-docs-12.1.1-3.2.el8.aarch64.rpm 609e5583f4ab60ea8a16a1692f481ee32f13f1f624663683b3c93a9c19bc244d gcc-toolset-12-libtsan-devel-12.1.1-3.2.el8.aarch64.rpm 27150a171ff525a8ef963a4a31c2116da005f48569ab72c1b82608dbdec2d3ea gcc-toolset-12-libubsan-devel-12.1.1-3.2.el8.aarch64.rpm a79ad3b957b8aa61b7ea5e73ea7e347d5296884c1167f79158c5976d39ff9327 libasan8-12.1.1-3.2.el8.aarch64.rpm f781a750f812d9b79417a96be153f9327caada2d4457663f81f4c90c990f29ae libtsan2-12.1.1-3.2.el8.aarch64.rpm b2750a4c0e1ed336faac8417516ffd9d7d830f07e49241aebecdd7734edf212a RLBA-2022:7571 gdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gdb-8.2-19.el8.aarch64.rpm 609d4b0b5f9447816d5d0751449289fc9a2343f5e58bec6112c4f5bb63bbc5eb gdb-doc-8.2-19.el8.noarch.rpm a5cb96d55c9ed35cbdd66cfd69094b735ec8779433a2f8c6fef748aa81523063 gdb-gdbserver-8.2-19.el8.aarch64.rpm 373b7d129953fa6033887b4e4aca28288164a9bfb5fbb8ba842b7817b5bf2c9e gdb-headless-8.2-19.el8.aarch64.rpm 48e3c647fde8a17a79517163200457375667f08a2c025a7591e66498fbf9dbda RLBA-2022:7572 python-rpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-rpm-macros-3-43.el8.noarch.rpm 7279373c1134dc6b6cb8ce672a412ac4612eeb88fad59bdbeb5a443227dd1701 python-rpm-macros-3-43.el8.noarch.rpm ad078c6aa5c5c87877398479a751b5d9fc9eb50f9e31732052b2e4b632a08f5a python-srpm-macros-3-43.el8.noarch.rpm 39993310e90d3cb12a8c8de11906ee08fdd67f8a5791a530366ebeebe11b8457 RLBA-2022:7574 rig bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rig-1.1-3.el8.noarch.rpm b1c77e8a68fdde3ce5d93decef1f8521b1570f8b1e54fc3aacc303b9808a39d8 RLBA-2022:7575 tigervnc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tigervnc-1.12.0-7.el8.aarch64.rpm 69df7afcb28f64683cbf1e0ef210e3c38fe936fc3e5144067463068ea35d1105 tigervnc-icons-1.12.0-7.el8.noarch.rpm 122d4ffa5aea6b6b5fe506d065052144eb03b99912c49b6455e801cd7df75b56 tigervnc-license-1.12.0-7.el8.noarch.rpm 87b0fe02ecff533d787878381a4da36e22d4d3693bbb5c01ff77d3fa096f7024 tigervnc-selinux-1.12.0-7.el8.noarch.rpm 63f0cc1c4e5b95df906f4c02f07b8cdfa9ea1a3a24b81fcfbc6fc071366a0520 tigervnc-server-1.12.0-7.el8.aarch64.rpm 52e0caf29d0d674a9b43ccb1b4f568fde88c63b90dc0440439139e914f297460 tigervnc-server-minimal-1.12.0-7.el8.aarch64.rpm cd4823d84b730c69e018f777866f540fe2c3222b3a34796e0c15f28d0f5c7e69 tigervnc-server-module-1.12.0-7.el8.aarch64.rpm 2693a5a1275aa54adab30da13cc9c774ef1847867e77270aa974e2d89ca95875 RLBA-2022:7577 sscg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sscg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sscg-3.0.0-5.el8.aarch64.rpm 0e80bb5abeef2a7d37b8491c6984dd2f2338462d6439914a1e509b261bf4dd1a RLBA-2022:7578 pulseaudio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pulseaudio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms pulseaudio-14.0-4.el8.aarch64.rpm f1a10c3ec3a34be86be4c07e03a65f92f11fd4fd4a2160fdcb07239ab0617532 pulseaudio-libs-14.0-4.el8.aarch64.rpm ec4b645017d7268f762f3f82b933793520eb17002a02901210e3e04dc70f3243 pulseaudio-libs-devel-14.0-4.el8.aarch64.rpm 256b2ab75e39e1db78604d6b2d8a59ce26a2513ec19601f5dfc3ada486a830b8 pulseaudio-libs-glib2-14.0-4.el8.aarch64.rpm 63e80714c2311d2412fbf3ef5edf56d3ec7707567418cca74028b3c2df184117 pulseaudio-module-bluetooth-14.0-4.el8.aarch64.rpm 84785deacd4a431b7779a07dabef15b7522a666f3ee86927116cbb9c54df034a pulseaudio-module-x11-14.0-4.el8.aarch64.rpm f86145b2d984f519c710240863181a506a9e0a82c2ccbfc3d3091639f2e1aed0 pulseaudio-utils-14.0-4.el8.aarch64.rpm d95a3b4aebceecc6431ed0ddcede04b6400e72b28d1a5529b2ffd0ac78955431 RLBA-2022:7579 cockpit-session-recording bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cockpit-session-recording-12-1.el8.noarch.rpm 421b6d20e2ea6ad78f323be68bdb535b53e542b975e5823363306ea5481a90cd RLEA-2022:7580 nodejs:18 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nodejs-nodemon, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm ec2f3e9547f189b1ac35d0ab8b0f84f81b80eb6639f17bf9a84dafea7dfe4e18 nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm 0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2 RLSA-2022:7581 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python38 python38-3.8.13-1.module+el8.7.0+1063+20f2b9a4.aarch64.rpm e676156e1f6b29193a363061e03868c782d29659db679ff24f1a9c231677d030 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpm d85f27c4100a37c74577e44e0a1d7691b2320c26c1fe40d981594be3a8287633 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpm 54e81d985e4e393d585026d91b3e44ded13ff1be7955faeccbc561e9b3ca4146 python38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.aarch64.rpm 7b2d3894385ece11897a9697d9f90ed6ce17cda40980d295919369fe140c8b13 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-debug-3.8.13-1.module+el8.7.0+1063+20f2b9a4.aarch64.rpm ee8aecb1074e99dbdee4da1733210f7f32ec3d86a6539bd65aee8042dd70de1c python38-devel-3.8.13-1.module+el8.7.0+1063+20f2b9a4.aarch64.rpm 42c7b80369d23cf0472d352e57c6c51fd448516fd4e628e0c8ec057021c2bc68 python38-idle-3.8.13-1.module+el8.7.0+1063+20f2b9a4.aarch64.rpm ab6a2afa8703806e3befe11d82f1bfff73c436e0e48e411c4151c3cd69e0b51c python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-jinja2-2.11.3-1.module+el8.7.0+1063+20f2b9a4.noarch.rpm 883dbbd5be4f1eaeab9086df9445ffc28ccdaba34653b37ad511d59a75bfed3e python38-libs-3.8.13-1.module+el8.7.0+1063+20f2b9a4.aarch64.rpm 67c76fcc269b000fe32b28a74f8733f631fe129eff73ec03f53c401c2d1a8d0d python38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.aarch64.rpm fbb90dcc33905a962d5b0c402c7c868d78deb85c2e5dc1b1065b04836d534cfe python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-mod_wsgi-4.6.8-4.module+el8.7.0+1063+20f2b9a4.aarch64.rpm 97f976d3433f1f41a3b2645c514dbbc755bbf2141fa4d21c43bcae099c3c4197 python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.aarch64.rpm 6b2da5147e67a3a9df2111e9b1bc56adfcd1a3b90eaf479184ebce2d9d49f0e2 python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpm 9b3dbb19e62de13d9396994f865fe252d5816356d9321c3cd64fe5775f9d4218 python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.aarch64.rpm 01ffb65f59edcf2309a1e7a1c588c4cb412a5e409d03f14879ae0d0fda0d5e09 python38-pip-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpm 964ca9c5bc0818af45467f59cc7e3595ab2dc3491020642fdd0f74f6f4008f34 python38-pip-wheel-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpm a774e8604a587c3cfe336da973b573416850b4e2fc6858c83edbf3b884c7781b python38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpm 49756f260ca2a3e3142a6e4f2673edc9695025d90cf19be15e824bd74f06e239 python38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.aarch64.rpm c2ce2777767146177e0449aa761678a94497ee99d38f4129c09ea78b1f617198 python38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 19b4eb8c7fc998d915be1de87f41b5aa455bb618b6ef606aac2743a29a108132 python38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm bab1991b44f95916cdd7be3a832a779b2479e6a5528706d955f97a3f20cd1761 python38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.aarch64.rpm 24f2309bb7ba0415cd0e694ee705f32d28a4023a0bc407089cb1cc088cce869c python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm 0fb4a89831bca8e0cdfe8526a6acd83e457dcc494420dc87c4de3ccdbb3eaa0b python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm 7daf58ddcf737deb07f5f2044318ff13db77aac81f0aa883a8403a99e1da8aa2 python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.aarch64.rpm ee022e80cc0b6ea0539fd6a02a6e5320596bc8e8d0773b7fc6e9466dcd340cac python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-rpm-macros-3.8.13-1.module+el8.7.0+1063+20f2b9a4.noarch.rpm fd866d66f9ca5928930867074b5ad03726fae25223f72a4d570c8c7710de1231 python38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.aarch64.rpm ebe4eccdf7f60bcd962279c10f4b674752dbdb7e3323b7539aa35eb7df6e6203 python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm 3c6af4f697c00c5adcd95066875ad9822fdc705e974cdea514749be83dd17d52 python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm b038bdb9b50ede04d3b94fcd7e0f06625a6fee2c99be14ead3a15bc9bcdb5cc2 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python38-test-3.8.13-1.module+el8.7.0+1063+20f2b9a4.aarch64.rpm 520b0a9a1898c1f8c33b7cb9c77366565f4565f88f40a2f8f3d105c8acdd54e7 python38-tkinter-3.8.13-1.module+el8.7.0+1063+20f2b9a4.aarch64.rpm d1855f22f2ab49362068b5ecd6a09a92b5706c9a52dcb7a6fed9ac5bd5d547b6 python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm 288302321a47ab51788ad97666b0a258279ad9b0a4dba03818e20f84e517f0dd python38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm 67c84dd6faadc937503b43a5381fe9fa4aa3db54bb96b83621c2d1a0c4c9f948 python38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm c50b9253593f355f6e89721a5b6ee9025e5d8c1ea227cbc2d54b0b8fea12cf08 RLBA-2022:7582 gcc-toolset-12-annobin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-annobin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-12-annobin-plugin-gcc-10.76-5.el8.aarch64.rpm cee0a59ed48f7b8b781a82ee254a4931f39a864fa01e65dceb2d15729f2d40e2 gcc-toolset-12-annobin-annocheck-10.76-5.el8.aarch64.rpm 56d2941f8dbb9dcdf4b3a6330e7fdca00932ecbe29d21b16d176441c43702b3c gcc-toolset-12-annobin-docs-10.76-5.el8.noarch.rpm 8f4fce9cd9bb839c7d7e447baad469ab5f83cd5c549b1f984584b40d9edae521 RLSA-2022:7583 Moderate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xorg-x11-xtrans-devel, xorg-x11-server-Xwayland, xorg-x11-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xorg-x11-server-common-1.20.11-9.el8.aarch64.rpm d7c97262411f74f1de05f481c665b11bdbac151427859914ebb17914a0b8d191 xorg-x11-server-Xdmx-1.20.11-9.el8.aarch64.rpm 9cd6afaf498dbf82ba2c7171a70e03759ad5ca26eae561193b1329748e594151 xorg-x11-server-Xephyr-1.20.11-9.el8.aarch64.rpm 0b2ff4fb4f84d3d9338d7125dcdef739b122d659fb4d48db34bff889a28f74a8 xorg-x11-server-Xnest-1.20.11-9.el8.aarch64.rpm bed99e577d2c1d2bf7760abe88a80d3fe82e81bf9b87340aa6778e85cce26628 xorg-x11-server-Xorg-1.20.11-9.el8.aarch64.rpm 61687b2fd3933c6030a43279b9779d05f56c95ec2c664134e33ea84cdcd430c1 xorg-x11-server-Xvfb-1.20.11-9.el8.aarch64.rpm 74090dbaf8507193937ae1574ab483824648a5e40e394b85bfb14b5d51201e4a xorg-x11-server-Xwayland-21.1.3-6.el8.aarch64.rpm 023719f9f389492a20e83615f54a5bbeee87f8fc588ea6336132bf71827e7a86 RLBA-2022:7584 lorax bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lorax. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms composer-cli-28.14.70-1.el8.aarch64.rpm d54d55c2c642edf448fde1c2c8a65559c37459aaa1bed59f1933735a7ef2b720 lorax-28.14.70-1.el8.aarch64.rpm 651138abac07e8be7a3ad352c64c49c6e45283c76c3a429452961cb4f3d13f11 lorax-composer-28.14.70-1.el8.aarch64.rpm e8baf709a82ddc494d887e8c62687c1790b9e932c747f459918f90293a31b997 lorax-lmc-novirt-28.14.70-1.el8.aarch64.rpm 0326d3782624ee265b829eb22409bae9158b61aecd54a394ea3417c6b3080780 lorax-lmc-virt-28.14.70-1.el8.aarch64.rpm eda89d78112fefd70065eec500fe6bead7db6dc8ccd26b1fde631f5091d240f4 lorax-templates-generic-28.14.70-1.el8.aarch64.rpm f2d312ef9776455200746c74b29e5d4eb887fe7153a5226eb676e061dae7eed1 RLSA-2022:7585 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libtiff-4.0.9-23.el8.aarch64.rpm fab0df48482440005669ac79ee1b5f581c7750120317bcf0505f93e2f360094c libtiff-devel-4.0.9-23.el8.aarch64.rpm 7003ae371ee44c87217c2e7087013fcd2a6c1423ced749460266882a26d0f7bd RLBA-2022:7586 tlog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tlog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms tlog-12.1-2.el8.aarch64.rpm c8758bb0f5ac94d2dc963c7f691ee1caf4a5a0f5969e18d2df26da7068b13c4d RLBA-2022:7587 gvfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gvfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gvfs-1.36.2-14.el8.aarch64.rpm 7e2bed90ef55289c989146f7b8aa5de308c20071d827fa2b420bcceafe59f329 gvfs-afc-1.36.2-14.el8.aarch64.rpm e49b53f3652e4767b592f90470f07ef8f033fd9cd16f3416daa144eff411bea7 gvfs-afp-1.36.2-14.el8.aarch64.rpm 3cb1b41f7ff17e7c6218c2a17bac02235e7866cdfe4dc1a992d2cd907b776ed4 gvfs-archive-1.36.2-14.el8.aarch64.rpm 851a9508ef0a4e586cca65add9723e3d04b944bd9723f1819aa360ec66e1705d gvfs-client-1.36.2-14.el8.aarch64.rpm aa2e6aced2669b90a6e008956d0d9d8dfaa1d6897931864ac3ff425f377c7fef gvfs-devel-1.36.2-14.el8.aarch64.rpm 95d989875cc731a9b6a6de25b065a6431ba11d3c9c7e9eb8a33b1d8dbb62100d gvfs-fuse-1.36.2-14.el8.aarch64.rpm 084836e86af9afeb4093fbde1cd9edf9fd6d3d850f962d5e1a17086a5de6c1e1 gvfs-goa-1.36.2-14.el8.aarch64.rpm 11c614f0e49ae7ddf694660089e361f2a76dee605feb8fc909ba4071e2c72d48 gvfs-gphoto2-1.36.2-14.el8.aarch64.rpm 182211ed7eeabbe30f88b91b4802120cf06ecd84780bad130f4efa6240b248e5 gvfs-mtp-1.36.2-14.el8.aarch64.rpm cdb206ab67dda0b38455e23e3978399b3b74f3b78c4686b48cfc52f14d9c351a gvfs-smb-1.36.2-14.el8.aarch64.rpm e393bac541b3311fdc0a3bfaef772b49eca80b0b369d01fa9ef9c6c8965e323e RLBA-2022:7589 yara bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for yara. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms yara-4.2.3-1.el8.aarch64.rpm cd4a8dbc3b9c6d40b247d2440a4cfeef0c6993ae4b47780d975fd2d502043c5a RLSA-2022:7592 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python39 python39-3.9.13-1.module+el8.7.0+1064+ad564229.aarch64.rpm 2590155339a48e726e6e59a9f19b8a0b8d60ed895ef624140b30b170b522572e python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.aarch64.rpm 945155b2014169d41094e7435f5f87d32f1051e106387ca6cc8e793f5f4724cc python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.aarch64.rpm a1d3823b13a2340272701cc377c599dc99c444cfbc72ddaa59e8bb49a0be753a python39-devel-3.9.13-1.module+el8.7.0+1064+ad564229.aarch64.rpm d7f6035af5bb673cd97a7f7bb8aa2bf82c8d640f13d7987e8935b8ef524401da python39-idle-3.9.13-1.module+el8.7.0+1064+ad564229.aarch64.rpm 4c100deffb17399163226c7d8903d8dd7118025caa5ad36560a22b4bf75a3ac3 python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-libs-3.9.13-1.module+el8.7.0+1064+ad564229.aarch64.rpm 8699b82f7c97154f13cb632f4a2de6be62e44bdcd5909e0ae4f58abc49a5ce6c python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.aarch64.rpm 6c6625c6c95d89323390378eaf5350c35b9343b064ffee3bd6d6d5aab9bfe755 python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.aarch64.rpm cec12f1c3cd2827c2cec3ae6efc19dff3d82c056ddafdc0d11ff94928d32a91c python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 0da717455ca0e38a885aa00a9f1ab095e43ad699c0999106516d7c0ee860f51a python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 1359c2457bcf3296afabfa4a3faf9c5852588cb881aca27112612f258f3c5119 python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm 5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019 python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.aarch64.rpm ba724bda5f89379dc12d94c50dd02ef0cc45d4a2657a311469101a57adbc9866 python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm dc96fad532dd6778a43cab79eca2e80d99d5c3daffd69ea743282f8f1a956422 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 518551ecb5bf3e32fbcf7dcc25feba54c738e86f77d84c1e50ff74e7f5f0f0b6 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 9dc218c0e4d7aa1754732b02593a0f0f727902dba3a3f0d93f95538c5c511ece python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.aarch64.rpm c107d9e7b25869b140877301ac6abefa2d4b9bac14a623975ca7aad2eaf7697f python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-rpm-macros-3.9.13-1.module+el8.7.0+1064+ad564229.noarch.rpm a4e8f84e09b7ddf2936e56bc1e40627d7d738894302a6c8254350ebd6ea35a81 python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.aarch64.rpm b5b8a4573507189006d61b606f716c102e75ad51f13c9a830467cb6bd3f56151 python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-test-3.9.13-1.module+el8.7.0+1064+ad564229.aarch64.rpm d3abb4268a02a82c1118b953efa2b87785f268c0168ce194bf5a0f983d6295e4 python39-tkinter-3.9.13-1.module+el8.7.0+1064+ad564229.aarch64.rpm 695ddb10f7661aa2110f177923f4d848c41ab6b840f94532dadc723866bdcc30 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLSA-2022:7593 Moderate: python27:2.7 security update Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107). For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107). For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__python27 babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 4af53602814c4e6074f48e25713ef6f8384bf956bdcefb1d33abd3c1071671ad python2-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.aarch64.rpm 0077b84e049e77853ad008b37eb9c3ecad40e61d8b5202de233f0b0e41d3bc93 python2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d6a5af1c63a0c3378303b207d396a7db61a42ca0f02e04460a6424e245ccfa81 python2-babel-2.5.1-10.module+el8.5.0+706+735ec4b3.noarch.rpm 9de14f945b487d8dc1f04035a229c98f3f2cc7ec0522d921c10217b302ef997b python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.aarch64.rpm 94a0af7667b29e361371ee000dac383c0357ad911906b27cb67fd8dcba2fd03b python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpm b829677801f0e39897e745f8cae0e2e9d94f1e51be8eb827dd231bc75054f015 python2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm f213c14d26ab9283fc2ecf49dfc0aaf822e2d6acc3e957259dfa0c63526b3e68 python2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.aarch64.rpm 9184583de8b0ee397f52b82183ffdb65a7561a594951fb399b0e9f28169ee339 python2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.aarch64.rpm 6025e876f3d8a9f6283d76609635f90ac0c4dc50c5884d7a79eb43826696a1cc python2-debug-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.aarch64.rpm e77c3cb6457310e4da5f258ff4532e39841b58837b19a68772c6a2fecfced9b2 python2-devel-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.aarch64.rpm 699190ee471e01c7863ce2a9dd0ee6a9ceb05047527b24acc1eda70715c1527b python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm 6b6b0ebc0756d8fe4ec7e8ccfd5607d8297235758c8eb2e78a6473b15a4299dc python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 29661332cc6d347d8878c81f586d3919e0c4992ad7fb517893b1522187114568 python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm 3003c89a6c9c4b98266ea10dcdf78acf9a77a939e70d718199fd52e3d64f0ecd python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpm 1db17473e5e85092f333c1e25c15ee697ea4f6c1a3dce089b7788a251ec6bb35 python2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm a829f0a48e82627c4dd84579e49789e36745238da25937ae4303cf7dd77e7eef python2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm 36b74ee67310bfe46b2ae84e2095a02d316b5382363566332e016d28be9ef65d python2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm e129b70c87cf8b9c4921df6d1acdb1314cc10c726c5d10d90f35aa7b0b39f011 python2-jinja2-2.10-9.module+el8.7.0+1062+663ba31c.noarch.rpm d273ecf02c532bb6e73c45d77e576f1b36560f9b9d913ac3f82f031b3503292e python2-libs-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.aarch64.rpm 3a5e827eef90c8927f8095123e9c1ceafd7e5cd7f9998cf081fac46699aa13b7 python2-lxml-4.2.3-6.module+el8.6.0+793+57002515.aarch64.rpm 255b88b437db6964f802adbc8f340ecd759dd3f391e574915594a9272db5147d python2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm 5ac92c8acdf9770dd0c7af9df0407316335e72ea990d03d05720930558037d33 python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 8ccedb9b6934da4f44a44b8ed26c88a3b500efd518f2e23919955b3174b1c7bd python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm a5a41f1719c5e69505b70d10969a96f0d57e8277aa8349477198f9b6d83b94dc python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 82618850ed681c3fb6f5b3c8911b7d924149cf73687bfc5a69ee9cfef1b3108f python2-pip-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm 424e634426f8d83d229c9960f37b448d1c68e8e656c8d820294ea9cf7262f368 python2-pip-wheel-9.0.3-19.module+el8.6.0+793+57002515.noarch.rpm edfdfe37a85d18af2192a371b7949e9dbb34e31f1acb4fde35483074d0e61e75 python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpm 0ec69e04fd338bf0b12f8a5e6afdb6b44affa10c553e1ff6ef61ee2174f8c16d python2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpm b1559d8d7f82bf6c4ffa3b99d3dcfb623890a9d171d805ff0b3a1ce622321798 python2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm d160d5770b80399c2254bc1cdc91c8b7807cc36e51c25d548d5151858f709ffa python2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpm bf7ff7c0bde9875521397a15cd92c06f36467a60757b60578059b2563cc2ebae python2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpm 4bec31ccfc82f677405e7877a23b93ec8680589a9325198033fa24abe47578e3 python2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpm 86b106be79a90384b789756147e7fad23bff877bd3b73977fc8a2915bfc38b77 python2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm fa648cf30c65da422c75992090ae5c2a2d0e0be0506e15f96f96b79c9c626dd3 python2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.aarch64.rpm 1a0c48bf6076f8b76ccb3ea7e85e451a8165c8d541a0dbb6175c1c37255e7993 python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpm cd544de5d4fd5563b6de0bc6d2f42d201355ba56e173849fb5b25ed7ac0e147b python2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpm f41bd9b2508be3f72977ba02a5a025a989d63adfc828cd6bd642b5613f8c66bd python2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7f9ed20bc5f3c3f190872755dfdc02b5eb92fbcd6691103166dc1ac9b7a8dfed python2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 3733a16ae171032949da3485f3c3da032874a777398e60d04606eceade94e53b python2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpm 7aec982f4a72d2d16be3e87c9fba49497d228c0b2a3390d8397bc538876cd326 python2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpm 5ec4237f26cf53e44780cb8e9e89a6cdc4b7e622b401532b0dce1caac0661543 python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.aarch64.rpm a09b0362a51a0d1e18fe75ed1833a38d34930603682d48fabe7df8d84216b822 python2-test-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.aarch64.rpm 6702e255a8d1225b0b72aa02e0279a42aac89eb03b4f1fff888ab191b328285c python2-tkinter-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.aarch64.rpm 00d891f9efdfed69604667db19db947c89348624e82d387231d488e6168e2963 python2-tools-2.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2.aarch64.rpm d9b46cc8e6c4b91f720b77239eaddfba37881b3aef9845e2cc94f1ca09de680e python2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm a6d63e5fd906588d87b44892e72622379da62a816682e7e482912cf6e31ba509 python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm d917c2779bfb2d54f0a28e56bc58fd57f1752c6ef56b6bec04b3b6467fcf430b rocky-linux-8-aarch64-appstream-rpms__python36 python-nose-docs-1.3.7-31.module+el8.5.0+671+195e4563.noarch.rpm 65b5faf87ae039b9a6d4b4baaaefa6ba11de2e3e6cf00bc376dbbaf3d81f8960 RLSA-2022:7594 Moderate: poppler security and bug fix update Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for poppler. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms poppler-qt5-20.11.0-5.el8.aarch64.rpm 482e1c96204f7f46833904cd64d6086cd23414536ff1658517e22c7a0b46ab3d poppler-20.11.0-5.el8.aarch64.rpm 05509d516e797347a13aacae54f4ca5b83f49ac5976ac47684777269af35e189 poppler-glib-20.11.0-5.el8.aarch64.rpm 9981b66d9ec2b89914e0cfab65600789625ad18187d4d54a7d16311f546e6f38 poppler-utils-20.11.0-5.el8.aarch64.rpm 6d4220ef06778717f0bb8d443fe5d98f2f070d0f811acf581f677e54dea3f205 RLBA-2022:7595 bcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bcc-0.24.0-2.el8.aarch64.rpm d5cd8f3fa8c20c5e2deb8d2a135873ee82844afa2ebdf275d4a50b075da65371 bcc-tools-0.24.0-2.el8.aarch64.rpm 90f88ed5a9efe2041267c121a0d89fb98f872874114e8ca8477eb7030fae8c39 python3-bcc-0.24.0-2.el8.aarch64.rpm 45aa370dc452047d00284b1214fb8282dba6905cb0b16b8a5e15bc3733702d8d RLBA-2022:7597 ansible-collection-microsoft-sql bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ansible-collection-microsoft-sql-1.2.4-1.el8.noarch.rpm b5780681de6ea1535d87398d29640288a0b6df15f60431698eb8105386136333 RLBA-2022:7596 sblim-wbemcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-wbemcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sblim-wbemcli-1.6.3-16.el8.aarch64.rpm facacda49a82e0848cadc2f76c95f3e4915fdebb893fcba8495178a0449c1732 RLBA-2022:7598 bpftrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bpftrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bpftrace-0.13.1-1.el8.aarch64.rpm 0406facd0e0bb721ac0b1f830e50c6d170d40b3ab147c0af30c5045bf8903943 RLBA-2022:7599 xmlstarlet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xmlstarlet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xmlstarlet-1.6.1-20.el8.aarch64.rpm 2b098d45e61db22c741d1cb3eb0b8b7bafbc1a914de8610d199a7115416e80f2 RLBA-2022:7600 boost bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boost. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms boost-1.66.0-13.el8.aarch64.rpm 62c98670981c1e3836685b696c5bb972e18e29a0b73495f07980722fe6c9110a boost-atomic-1.66.0-13.el8.aarch64.rpm b1d1f649e4871d4ccab10fbc1456e3705eb15f560f53836d6a8392d04ef34d84 boost-chrono-1.66.0-13.el8.aarch64.rpm 6edd7ca0e904af0c21612ec1b19e48f7065b2917824a237e62a049b0852ae506 boost-container-1.66.0-13.el8.aarch64.rpm b09d0f8538a676776fe51537e9508c5566758a349f082fae7fab0f9703d6883c boost-context-1.66.0-13.el8.aarch64.rpm e84fe3b03e0d7018af4df7233de920e35d5a3d724f63235f9bb5fb537fb039b5 boost-coroutine-1.66.0-13.el8.aarch64.rpm 7ab3d746b21f31de3916b925d96d861e35b86d6efcaf759d2978908d0791d029 boost-date-time-1.66.0-13.el8.aarch64.rpm 4ae32bbd5d0c3c773354370ac0ba85a4a55644c394f4613861ceb94c1ef471b8 boost-devel-1.66.0-13.el8.aarch64.rpm 5080c385e375d748d57deed21bc8a22cb723c0697bc495705f69c8027b6a24e5 boost-fiber-1.66.0-13.el8.aarch64.rpm a01491c39ac32d7abb735b71ffb8e02e592f773e10c4b3812a69b65ce723b885 boost-filesystem-1.66.0-13.el8.aarch64.rpm bf2e3373e10a5af46774bdc08d669a24e5c2d136de72ac39785f92a69dedf392 boost-graph-1.66.0-13.el8.aarch64.rpm 2d2dc6c054dc600f977985b658e01c2ec5dd02125a962e7670b88dd44824269f boost-iostreams-1.66.0-13.el8.aarch64.rpm 120fc3affb2516d5b72a91e27d7f2d23d26444d3dff885c2e9f647400b306516 boost-locale-1.66.0-13.el8.aarch64.rpm b26ee6c60ba953b1851160a1fa0b4ad72d6a81083dafaac7daff6903d8d224ff boost-log-1.66.0-13.el8.aarch64.rpm f01d651668eb0fabd12312a1039d1d836dfc2e2c93c1a133330f76cfec75fdfa boost-math-1.66.0-13.el8.aarch64.rpm 67e276d26e0bbc676fbac1e65d19b9d4ee8d3e34d68e503ff314760c3bdae7be boost-program-options-1.66.0-13.el8.aarch64.rpm 910fc8bc93ef6f55c98e1a8cfb94e8249601677a505183898f5d800c129292e0 boost-random-1.66.0-13.el8.aarch64.rpm 0cad50ba11c179c36a43c392f11edec58fa1cd0021612e1895ab76ed1a747b68 boost-regex-1.66.0-13.el8.aarch64.rpm 910931893e598399dc804ad3a817cad201836548f94f6d62a5b2bae29322bb42 boost-serialization-1.66.0-13.el8.aarch64.rpm fdb8c163a6482bcf4603920aa3e3ec2b842168e91eb2d75010347d0dea93e582 boost-signals-1.66.0-13.el8.aarch64.rpm 0337e3aee8f70a6c6eba91b949159fd61e329cc649a355b3fe76b07d6370d8f2 boost-stacktrace-1.66.0-13.el8.aarch64.rpm 62eeff605f1f22525fe62e9b0c44ee62e79ddef2c8fb686e64d310a6cc72d7e0 boost-system-1.66.0-13.el8.aarch64.rpm a33dfa51460ae4b7ebfd90ebf5cb03625343f5abcd4a6064b57115486d642128 boost-test-1.66.0-13.el8.aarch64.rpm af68fab6a2c7d1f5992b52dc6176b10b75ce15982f6bdee857bc6a516b35f9e7 boost-thread-1.66.0-13.el8.aarch64.rpm a2f1b8796a72e40cd5e8999e8ba4bd9218a0fccce4d11ebefb7ef1d8113fca22 boost-timer-1.66.0-13.el8.aarch64.rpm 313bc431549e310d9990e910fd9e0bf80da6107498a08952f06e7704cbf98c34 boost-type_erasure-1.66.0-13.el8.aarch64.rpm 79dccdff450b3e826a0b08d4c8759c702c5aec13f83ac38dfebf6f7b5d35c7ca boost-wave-1.66.0-13.el8.aarch64.rpm 99a9f8371b61c8a8558349d4af030714c7ae6973506664521a9d5cd50a79d346 RLEA-2022:7601 libdrm, mesa, and wayland-protocols bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wayland-protocols, libdrm, mesa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libdrm-2.4.111-1.el8.aarch64.rpm 557f9fcd8755189cabd65180229c2ce2e2a304dd12fe6a293933658142d0a7a9 libdrm-devel-2.4.111-1.el8.aarch64.rpm 226cfd53c8ac8e66f09fdbe707c60b4ba94b426150da98d44d1c4aa6cae6f55e mesa-dri-drivers-22.1.5-2.el8.aarch64.rpm e06c2a6f69a740082587635aa0260fbf7e4ff50e82549336bfe7a947b9e380d4 mesa-filesystem-22.1.5-2.el8.aarch64.rpm 6a3a55cd1d00738914eee6853e5a9f3c8b9b8ba5155acf3207fa800b948c9248 mesa-libEGL-22.1.5-2.el8.aarch64.rpm 586ef0af46a7256e39ee11a92fd0c00de8b66af30941390d47925e834efa9837 mesa-libEGL-devel-22.1.5-2.el8.aarch64.rpm 1b68f77b6b71db6962c171b26e79b5a7c5d9c32c2770d11d45e4d46d18409c8d mesa-libgbm-22.1.5-2.el8.aarch64.rpm 0f6ea31a94d029a133495b399ac8a6996e85fc48380f596ea3d36c2817cae594 mesa-libGL-22.1.5-2.el8.aarch64.rpm 7b9999408ad3a658208ac93c85c7a4d0e37396d2b9217a21b6d35f08d1aa423b mesa-libglapi-22.1.5-2.el8.aarch64.rpm b31810699e9c6f220279b0ad7b6353767ace841e49b7feacfac0203bba93cbac mesa-libGL-devel-22.1.5-2.el8.aarch64.rpm 95ce2dcddd79ab3109032739bc47ec4c8eb121c005251e35e9ef2c8563af3039 mesa-libOSMesa-22.1.5-2.el8.aarch64.rpm 1c034e162cf02c369d48df5683ae46ed3a60ee5acf713d947aec99df51326d48 mesa-libxatracker-22.1.5-2.el8.aarch64.rpm 711332063828d532eba75d4862559bbae82d29a46771234c2994783a634f92b8 mesa-vdpau-drivers-22.1.5-2.el8.aarch64.rpm 140b5663161cdc86c684703892cbf29a7fcfbcf2847a650eaf345508ce8ed112 wayland-protocols-devel-1.25-1.el8.noarch.rpm c645c67840d46c277228fba73bf4e6bbb72e84f9e18128c1b6573e48ea19643b RLBA-2022:7602 gnome-initial-setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-initial-setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-initial-setup-3.28.0-11.el8.aarch64.rpm 7519239d4286f6c68010069539fc309958efdd69760f1992d08e266e245bcef3 RLBA-2022:7603 gnome-control-center bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-control-center. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-control-center-3.28.2-36.el8.aarch64.rpm 2caca20ba03e8a66c41e8d076227864d81eb0746ba8382091ca9c4e970a06bb2 gnome-control-center-filesystem-3.28.2-36.el8.noarch.rpm f338919013be21a2a7e03a22a0a6088b909ae6e9d90c1902c6ddce444ff842f3 RLBA-2022:7604 libtimezonemap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtimezonemap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libtimezonemap-0.4.5.1-4.el8.aarch64.rpm 8db4668d2378fb4232231f3f49df5bf0a0676eb511958676a353ce509fd37663 RLBA-2022:7605 python-blivet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-blivet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms blivet-data-3.4.0-13.el8.noarch.rpm 21038d8e6715177bb30fdffe29caa8047036d8a9e817a9f4557e857576ed3d03 python3-blivet-3.4.0-13.el8.noarch.rpm 4eb44d9cb4d461a71b079b91daa2a66ba24a8041a2b2a841fcefe68c0a09319d RLEA-2022:7606 gcc-toolset-12-binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-12-binutils-2.38-16.el8.aarch64.rpm fba5e96fd15b274a193c4967526559f2e9e133886e2aa9b650015611d35b1798 gcc-toolset-12-binutils-gold-2.38-16.el8.aarch64.rpm 7540a0925a5475082e2f7a5e262083e2a314d508a9555372867559411b70afd7 RLBA-2022:7607 pykickstart bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pykickstart. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms pykickstart-3.16.15-1.el8.noarch.rpm 5270eb7d3a8d938917795fbc4a97ad7e45f7e7b0d81268574ff6320661a98c21 python3-kickstart-3.16.15-1.el8.noarch.rpm 30e8cdc0d4311e2e415e67279b55a32b7dd530c870470a475a65ff92f5b2f490 RLBA-2022:7608 gnome-shell-extensions bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-shell-extensions. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gnome-classic-session-3.32.1-29.el8.noarch.rpm ec80f11be7f3a0595344d1e76e40210a39f4ab8fa9cbe0ae2e135df854de500f gnome-shell-extension-apps-menu-3.32.1-29.el8.noarch.rpm 8ff4b8e79c614a53b308862b5ba099ea520372ff9d3b1d1ac87cebc2573ea873 gnome-shell-extension-auto-move-windows-3.32.1-29.el8.noarch.rpm 36ef1c571cdab77ddc26df1e3dba64c7034510c18ddac209077030ffb23e4e65 gnome-shell-extension-classification-banner-3.32.1-29.el8.noarch.rpm 43fc28d158eae75f84497651b3d7aa3d02080ba45117542b667abb3e5eac17f1 gnome-shell-extension-common-3.32.1-29.el8.noarch.rpm f9e03be95cdae3bd435c09654fe4763d867544e7ef1b0f6de93e897ef8b88880 gnome-shell-extension-dash-to-dock-3.32.1-29.el8.noarch.rpm 1437bd1e26f6e5bae726301e22d884de7718776e695115358b9582439dbac2cd gnome-shell-extension-dash-to-panel-3.32.1-29.el8.noarch.rpm 13109fa9b789c9d729d117a9b23442bda94c2e048fd5bc513ea45f4d6f5ac2a2 gnome-shell-extension-desktop-icons-3.32.1-29.el8.noarch.rpm 44bae8d2436af05c68532a3aa6d641886e1096bc76de35f3a13419783b90a13a gnome-shell-extension-disable-screenshield-3.32.1-29.el8.noarch.rpm b4eeedccf7e312891b60b019f003cc700db470759e24956d72599daddd263127 gnome-shell-extension-drive-menu-3.32.1-29.el8.noarch.rpm d0c25677bc73ab8be55dd75a6b154bd3d6e45af1b3730f69b31240d687127715 gnome-shell-extension-gesture-inhibitor-3.32.1-29.el8.noarch.rpm e1a19c816bc7bbfcf37412a463cf513220092cb06f3ec57a5af7d6b6d3509a25 gnome-shell-extension-heads-up-display-3.32.1-29.el8.noarch.rpm 2cf86c95586dae1dac778476e5098570263b91a343cf860836efd2c5060930fc gnome-shell-extension-horizontal-workspaces-3.32.1-29.el8.noarch.rpm 54839e0afe4342dd93e6f77f011d23f954f32e7225a254b1cb52dbfaf2af39fe gnome-shell-extension-launch-new-instance-3.32.1-29.el8.noarch.rpm d717ac1201846aab0c38fda56f440ee715c830a88eaf1e48569073d8be0d550a gnome-shell-extension-native-window-placement-3.32.1-29.el8.noarch.rpm fe769035681631b8437e248ca0f54cb9efb38d92fa5a45ee92f15b03eef0b3b3 gnome-shell-extension-no-hot-corner-3.32.1-29.el8.noarch.rpm 1e425de8c652a7644794cad6b3a186c7be9965ad6a62f8954518cd26bd5fab7a gnome-shell-extension-panel-favorites-3.32.1-29.el8.noarch.rpm 9f1fb38e2f1dc30284ce563f58f1a336af8ba66ae846587a5f4104ab4d15e03b gnome-shell-extension-places-menu-3.32.1-29.el8.noarch.rpm 4911b77cb960766bd1f7116b9c1f5e5080a7da0bd7b0aac74a5bb874ab759644 gnome-shell-extension-screenshot-window-sizer-3.32.1-29.el8.noarch.rpm aefc7ebeb9924e6cb9db289fd0155bf94757f23b3d110f6ded12d537ef942253 gnome-shell-extension-systemMonitor-3.32.1-29.el8.noarch.rpm 4be5338d8da85faaeedc3b7a14540dd56d122d7ce980ffd4b888639b1020a3f1 gnome-shell-extension-top-icons-3.32.1-29.el8.noarch.rpm 0246925d43a03cc53dd168dcbc8c8980332682701a207e75295019d5277b69f2 gnome-shell-extension-updates-dialog-3.32.1-29.el8.noarch.rpm a3e9294e11d4f33912cda78765a01972381d87fd8d13ea5863ad17824d22674d gnome-shell-extension-user-theme-3.32.1-29.el8.noarch.rpm 5aa9438364059f0ddca85cc550e02cdd57e80c27a2979ac6b8191862802c9d21 gnome-shell-extension-window-grouper-3.32.1-29.el8.noarch.rpm 84a178d51deabb79c06616987c0794dfc3f3a47c4799c3570d2fd6cbc0755383 gnome-shell-extension-window-list-3.32.1-29.el8.noarch.rpm 64ed980e57259f0f6fde54d7f00ddeb242c813b9e7e1e0483796805beca63e09 gnome-shell-extension-windowsNavigator-3.32.1-29.el8.noarch.rpm 48d8cec0257865f83b60d18babae4bfde1b7ee0922468d25551cef74a0cfb68b gnome-shell-extension-workspace-indicator-3.32.1-29.el8.noarch.rpm 13e70c18aeacb3000777d9234044bf1cb574429899c023c8eb6ac2691fb23413 RLBA-2022:7611 esc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for esc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms esc-1.1.2-24.el8.aarch64.rpm 09dc718ab76a80d981303d1846e486b5aaf04de8a486fcb0fb8ce183e85ed37b RLBA-2022:7612 rpm-ostree bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm-ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rpm-ostree-2022.10.90.g4abaf4b4-4.el8.aarch64.rpm cff68159ff15ba6becdd467c8f2166f7334466087b7e011f3127553517343875 rpm-ostree-libs-2022.10.90.g4abaf4b4-4.el8.aarch64.rpm e8ac87ba2d3b495e36dd742d161ec9d11d5b5588d85851ef69026d7391f2ba90 RLBA-2022:7613 linuxptp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linuxptp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms linuxptp-3.1.1-3.el8.aarch64.rpm a4b6e5b83adc08af84f75ac0e6ea687bc5a9ff79ddf9f0cb02c5e8da6873c82d RLBA-2022:7614 xxhash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xxhash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xxhash-0.8.1-3.el8.aarch64.rpm 53d405b21cee97e24dc05062439eddf8544fc073e186beeb958bc05ccc4d8f6c xxhash-libs-0.8.1-3.el8.aarch64.rpm 4f6755c3e5c6c971ccd12ccd90f1223f6fc736e10c6dea7a1eee2183d374a112 RLEA-2022:7615 alsa-lib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-lib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms alsa-lib-1.2.7.2-1.el8.aarch64.rpm b41bfc9575c6610207b9edbf082d7c07b23f4df3743a71d097599c6c3475b6ee alsa-lib-devel-1.2.7.2-1.el8.aarch64.rpm b59d3ca50775f5dca0bc2da125ad73499e5d1d77aeb3afd3fb0c342c520ac2b4 alsa-ucm-1.2.7.2-1.el8.noarch.rpm 6308c9e936e757cda9caca8550a95b9f749c127cbcce07149faf1f893c6a894f RLEA-2022:7616 alsa-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms alsa-utils-1.2.7-1.el8.aarch64.rpm 3e452594819e81ee49c7a7399c4ff996c0be77747f60800f5b6362c1fb28c7c8 alsa-utils-alsabat-1.2.7-1.el8.aarch64.rpm fb893a595da50967b0e5fa0ecda88584567c0feed73d0201942ba96fb0e3bac1 RLSA-2022:7618 Moderate: gstreamer1-plugins-good security update GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters that operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer-plugins-good: Use-after-free in matroska demuxing (CVE-2021-3497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gstreamer1-plugins-good-1.16.1-3.el8.aarch64.rpm 9ee67791bd632e81caa9cca56748da6f45876d79cb8ff4c09fe0210ef8eb3001 gstreamer1-plugins-good-gtk-1.16.1-3.el8.aarch64.rpm 42f6390497176bd21a4fef573cef3a4019a7d83a101b6057a97ea51611485a27 RLBA-2022:7619 libva bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libva. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libva-2.13.0-2.el8.aarch64.rpm 1ef3901497c87e5be908ed889b72196e8424a2b908cfbfb6b0beb84d367a57bc libva-devel-2.13.0-2.el8.aarch64.rpm ad89ad936b4782a0fc9869bdbef3b579a962d918332556b9298790b2a9cde60d RLBA-2022:7620 sbd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sbd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sbd-1.5.1-2.el8.aarch64.rpm e6011d7c929e11901a27f09012026a4c065f295c7c1da5d1bfb224563c85a8e4 RLBA-2022:7621 make-latest bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for make-latest. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms make43-4.3-1.el8.aarch64.rpm b8337cf84c1a5e2abfa83274a513f8a7816953da5350f422a887e0047086f99d RLSA-2022:7622 Moderate: unbound security, bug fix, and enhancement update The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735) Security Fix(es): * unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for unbound. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2027735) Security Fix(es): * unbound: the novel ghost domain where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack where malicious users to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-unbound-1.16.2-2.el8.aarch64.rpm f167f31c3e1168f2ef3d0d5787e4459f5a3e9d1b5b3e5d585d737c0250fb88eb unbound-1.16.2-2.el8.aarch64.rpm 4ec7a3b56cfe1b2362568df29d86d33f27acf38f2f678edc662077e09be92a49 unbound-devel-1.16.2-2.el8.aarch64.rpm affa02831d8e27387a65b2b593527166da5d4aeaaefaa538c18cfaf023b7cbef unbound-libs-1.16.2-2.el8.aarch64.rpm fa7a057c317908dfae0a3693c400968ecfd4977baf933d927697f602b5999be3 RLSA-2022:7623 Moderate: dovecot security update Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dovecot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dovecot-2.3.16-3.el8.aarch64.rpm 505ebc856dbd2fcf4bd4215684b67d050420745851f70413bc2729aa1c0af266 dovecot-mysql-2.3.16-3.el8.aarch64.rpm 932140650d1420c3a702d8b0bbdbcbd8050d10a7633b3d3e1722b5c3b12ac1c8 dovecot-pgsql-2.3.16-3.el8.aarch64.rpm 400579c479714a4f9d7cdd423f328e12c85df4f4ee6b08a45415cc630afc289e dovecot-pigeonhole-2.3.16-3.el8.aarch64.rpm eba34e0f9827c1f0c0351ff4f223e767b79e960aacadeb71e8a8ed987e244e66 RLBA-2022:7625 haproxy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for haproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms haproxy-1.8.27-5.el8.aarch64.rpm 6f999df50c66f375de08503f99d9e89a2efcd6075e8a3a7787cb1a66afbe8d45 RLSA-2022:7624 Moderate: php:8.0 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, libzip, php-pecl-xdebug3, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2100876) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm a05196d406c6018fdfbe6f70e2c016ddd81305ed02ec9966922cc91a01042fba libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f157c5b6ed5f6b65b73a42bb7cb94e92cfda9ba190ea707addd1299220f60547 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 983d3df277f937fed5b4afecbfa329f8e8d127f28f279a061dfedd80c7b5cbaf php-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 86179ca583dc3f80c3ace13e54797b7ef7a4d9117741f2b069e79bf34e49bbd8 php-bcmath-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 11d1d66828dcd217e03de4492b5e9aec75a80a2259ed5905896296c818d59d13 php-cli-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 41ee17277af1f85704ffbc7365210e37043ea88f3dbb22de5b9f79eb0d31edf1 php-common-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm cfa65680e201d26dfbd83f524637afc0cea79ab18d1bfb2088ff87c06f75a7e8 php-dba-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 3815e3627508d18efeb044ff4758f1b2e7f4f2c76b9157777b3389330b2acf7c php-dbg-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm b692035ed639bee89a082f50cbd0aab3f5a6ea44f1e6a8f7a80cc39bda56e40b php-devel-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm b2fb4cc760e41ca42a6255451049bbd11c2a42fc5484d9ee4bf48ad92f5f752a php-embedded-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 556e86c1f73b3872bd3d02ec5a5a6b81e87f6f973dd8c83649a5c860b70073c2 php-enchant-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 2c7e3ef95afba51a7877b00ba07fba9840bed2141e292280c4f76bfe28056241 php-ffi-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 90e6eab7142656b57ef4953d3048b8610d54a908afb0fe66088a1157815bf9c7 php-fpm-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm ef891981b1580f130715d7f515a4fc4c56b39ea5d8413ff98faf664cf3c73e68 php-gd-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm ebfc065e1e2294c569a74973bab99f512124424a4a09c92cd16eaa07582f2fe9 php-gmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm b890dc53e25fbf4620bdbcd3bd68042d8bb28445946dd2fb9a46907ed2400346 php-intl-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 7302f9ed959c0ae585ed302aa8601557d40261bbffa7d9fdf21afa4700865f24 php-ldap-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 8e7da8c363f4b9cda3b26d6792e132261415d5eefc34aebe583abfb185c8bd42 php-mbstring-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 597ec446a98a4cbf3520c4f34705f50d7d2fbb1df9ee1984f4bfe18d6b6d1b5c php-mysqlnd-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 6075e28512ae4dbfdb918b7eae8631d4f867635725f2a6430143f584126687f2 php-odbc-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 7dfbf090fcc8d99af43115dca58d6504f13ced67af114363c57000a43b68f0e8 php-opcache-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm f8b20eabf984172838041dc818eac4ca0dd32292aaddfe2e5a0666b8d59a89ff php-pdo-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 657c6a95559e1e2c99dbc3e122ac7017aa06704d96e7979c1d5b4f70ba769c35 php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm dbc9d1a4dccce66ed75a1a3aa458dddc86d92baaba8cde6de288552accb7ede2 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 182ea4f209bee5fc3c099f0db4b68cf95083244cd7df9fb331be559a8ca6f0ad php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f70c1c86d7980dce552fddefdb2d1139da17ebe2b40705d25c26827eb6dee241 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 129f337de743773a02b9051d756f200659b1adf72890187215a6a69eea834ac6 php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm e211ce74e31de0df200fd0a71f228f576092c564bda558fe8d5c951794ac60dc php-pgsql-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 7790bfaf278027793ab0bac6b84909045d72d3d4481ae8aaa7efe1d3356844b4 php-process-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 13b5d51f1674ba2244b500305cb77def6dc1dcd8454723b7e670f23223b94e1f php-snmp-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm c7cd598f50fb2dc5e684b8e0fabaee281c39c8133bb687e36c2f19f20319db56 php-soap-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm ebee7c1835fb8b4238d2e7072f8d8b0be91e29f7a7d0d9ead6a8cec0cb0c3c50 php-xml-8.0.20-2.module+el8.7.0+1068+7fd2c980.aarch64.rpm 4d396ab72b60f9c2858a080c607d4102eaba0ca95c20a916b3e7de881003f928 RLBA-2022:7626 keepalived bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keepalived. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms keepalived-2.1.5-9.el8.aarch64.rpm 3c3a5fcb2ea6dd68c7d0685b8cc22920b58b04e2f4732b5abe0027d6e0b3ed99 RLBA-2022:7627 fapolicyd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fapolicyd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fapolicyd-1.1.3-8.el8.aarch64.rpm a034b2cf9c851714a45f45caf03ca491fcaad3e0ee595fd49e9697549915710f fapolicyd-selinux-1.1.3-8.el8.noarch.rpm 25d673638918789319483d2a491bddb4dcdff7b8a1b3f3e528fb167fd77189bd RLSA-2022:7628 Moderate: php:7.4 security, bug fix, and enhancement update PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422) Security Fix(es): * php: Special character breaks path in xml parsing (CVE-2021-21707) * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php-pear: Directory traversal vulnerability (CVE-2021-32610) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for php-pear, php-pecl-rrd, php, php-pecl-apcu, php-pecl-xdebug, libzip, php-pecl-zip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (7.4.30), php-pear (1.10.13). (BZ#2055422) Security Fix(es): * php: Special character breaks path in xml parsing (CVE-2021-21707) * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php-pear: Directory traversal vulnerability (CVE-2021-32610) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__php apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c php-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm fe1d93250c7a062c9defbe66b898b012bca21278c9b7b8ba2198a01aaa92d1e7 php-bcmath-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 98801a5135cfb3c542d35dcbafae873263467226b8ff08acc335ade8175d06f2 php-cli-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 53b60b02ad8f3ef2ec9536ecbd6f717387f65d3a1555d34af2e49e5de96f3c8b php-common-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 8b731a4d23181ea8bd008b4a4b3cc155e25719d81722ddb7edf47f7fad35889f php-dba-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 8fd9ea545470dfdebfb3fd1aa33f9881ea3065a39db1e5c0be0126db3b251fc5 php-dbg-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 80c1ce885a35cba9baa70dbcdd8deca063ca66d74b334ff37a7c8a894eb35dc8 php-devel-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 3d44b878a22e10c93ae497f134349be9a280a7804d346946a023ce68786d1624 php-embedded-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 03a912c1363053efab59d52677b3fedd64b18e0ce9df5c97549e989ea9b89978 php-enchant-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 4abebe4dd5d2e2e829e941b4b9f5160eed0f02c8922586677d9457136a48bb98 php-ffi-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 2515ffcf32adddadc8eca406b3ed1ce2de85d9c6f6a84fff120f9f3ee8b818d2 php-fpm-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm cf435636b77de9a690006b4c56bc725be85eaef1f14cd97bf31365155e678bb0 php-gd-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 244c852fa794c77e63cd3bc8d7051c8cf621afe4cb6d3331a8f04ab915aa40ab php-gmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 60cdbd6c413140f53fcb2b59fa6704434893410ec1d2135a403361f5dd9407e9 php-intl-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 2065f66636bb7dccd48e48194f3b1b0694ae4f52ad888d2b46cd59ecdd08e99f php-json-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm b8e14869633c82eb16b5e0ea17bc6ce3bda686741081a4e238aecb4e55978b45 php-ldap-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm fe2d552b3b0b9c77523ca3a0d5170b98fb42804cb92f42f66de65b5d4179f3e4 php-mbstring-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm e385c6f0d473abf79381700a368f25112493605dc8160dc26d91b056e582c873 php-mysqlnd-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 859707564bd74d8563bf360c5d518bfe54f008e6483f51d2b7a6fbf9a646c9e0 php-odbc-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm bc9817d259d99aae858e3fca93925b019ce0e9984156d7b1ff6ca8c708368a6d php-opcache-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm b149a1471dc4a6334ae965daa7c2f69ba64873e3c90192c0e3916c5c6037e2c4 php-pdo-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 2f1d557592b8bbe54446880048814efed53c99bc6841bec63b52c37bfff349f1 php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpm 0274a24a75b3daf3269ac70271b558b3552d4a875ffeba06ab36b8ce58fbf9ec php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.aarch64.rpm fbf338994013e45024d53dee32bb8c4ad5d27123c3289cf41e6566a8b86c8dbc php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac php-pgsql-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 100be63e1d0b00ac2a3f6ef3ab74c105bbcf6683f927d8b17be0ae6d3d4e6cc4 php-process-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm a6a4a6512f6ffafcd27af43a94abcbdbe98dac1c5f1dc24ddd0c5c1e9cbfe849 php-snmp-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 575af2137c5d92247fe2c1a98b80f1fdb5ac881ed6565fe29ff3ce72d9ad6fd9 php-soap-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm ae0fee0653efa8091bf4b204b6862f81bd36d6a1799f0860043eaba9d5e3be1c php-xml-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 29027f09d6a0d663c539769a50f7d196f3bf4d925de9501ca016aa53e87713cc php-xmlrpc-7.4.30-1.module+el8.7.0+1067+0a7071cc.aarch64.rpm 8a2df5f7e62997c54dcf5ee2aa0c51bbdebcb48f28c4f7cdbd592c521fed76bb RLBA-2022:7629 nispor bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nispor. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms nispor-1.2.7-1.el8.aarch64.rpm 7eb71afac8554f0ac3a2fe9a868434a980a62bd164d9057a5e5b912589fa4a99 nispor-devel-1.2.7-1.el8.aarch64.rpm 85cbb5997edc4278f08228a94b89d9ac5af2878992af153b3bcd1450fe379d74 python3-nispor-1.2.7-1.el8.noarch.rpm ca5ab3804782f7ebe26676f7021c55c430a5fdea6421f1a69e7d91848645fecd RLBA-2022:7631 ghostscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ghostscript-9.27-4.el8.aarch64.rpm 23d4f036fd56fee7fa4b0247be6b086a72e70fd4f858a9fbb02fe24ea94ac110 ghostscript-x11-9.27-4.el8.aarch64.rpm 81823af70c5e450859b4eb7836e1281cd1173af4832554002e8e339ce6deefa5 libgs-9.27-4.el8.aarch64.rpm af76fbba34fd670607d513b49ea4de0e5dd905e9f5c4d910cf276994f757b5f4 RLSA-2022:7633 Moderate: dnsmasq security and bug fix update The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dnsmasq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms dnsmasq-2.79-24.el8.aarch64.rpm f4ae6a12dface29aa40de52d5a0e7f69fbe160d79268b64e05b756d099ee5427 dnsmasq-utils-2.79-24.el8.aarch64.rpm d0d2aa1c535c7264f9d598bf896046d3bff81aa1550508039112d3906e83841d RLBA-2022:7634 usbredir bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usbredir. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms usbredir-0.12.0-2.el8.aarch64.rpm dd44e64657a80efff79d7b9d7bcfef5e5e47d0530bac6ddef33cb304bcb25c96 usbredir-devel-0.12.0-2.el8.aarch64.rpm a3c70601e9cfbb1ae80cd8f0358e07783280311f491f72a8460f21d46416aea9 RLBA-2022:7636 edk2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for edk2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms edk2-aarch64-20220126gitbb1bba3d77-3.el8.noarch.rpm 4b34b5c95fe45802866961ee7c0b33467075d25f0f703f05418c779f0c07ef33 RLEA-2022:7637 maven:3.8 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, slf4j, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__maven apache-commons-cli-1.5.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpm 2504808e7bb6c06c2706696895ac60a31a83764d7df665046664c16f6594c4d8 apache-commons-codec-1.15-7.module+el8.7.0+1082+b3a88d23.noarch.rpm 9bfad29fd8e93554d4ca33a6711f7b793bbdadafb0a4db81eb9ba002abd94869 apache-commons-io-2.11.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm 4f7526242a56142e1fd231d9e7686f5a155a2070fa79fb52b1e83bad9639e8e9 apache-commons-lang3-3.12.0-7.module+el8.7.0+1082+b3a88d23.noarch.rpm 27037e8532d62c2e3b6e0a435bd903bfb1540f73c0ce6650c9bb8bde10330998 atinject-1.0.5-4.module+el8.7.0+1082+b3a88d23.noarch.rpm a050941f674330536ec0ed3895488df293d11bc4d71803ecaa6647d7ab61f15f cdi-api-2.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm d533b87cfce9ea04df2d36dfb14bd619952dcb306718824b59bb806f9d50e971 google-guice-4.2.3-9.module+el8.7.0+1082+b3a88d23.noarch.rpm 27d37752561262188b2a5618f171aa0d97e07b43f618e6f69ef2d73016394f39 guava-31.0.1-4.module+el8.7.0+1082+b3a88d23.noarch.rpm a932defaae72ba27bdf2e8022f699a92f1a2a72e8de4e6ce3aa61cdb220d4aaf httpcomponents-client-4.5.13-5.module+el8.7.0+1082+b3a88d23.noarch.rpm 53ad18936cb104b81292c49fbba185703fad1a4585ceda3f757b180265504b55 httpcomponents-core-4.4.13-7.module+el8.7.0+1082+b3a88d23.noarch.rpm 8c526281a2d18ae7f9b7a76f2fb1a04789781cd7ca0b2aec60a9997d66a2484a jakarta-annotations-1.3.5-14.module+el8.7.0+1082+b3a88d23.noarch.rpm 5e89bbbc4ee2348801c810af9e34c707b61764a73adfbd0039db7355de5d3f8f jansi-2.4.0-6.module+el8.7.0+1082+b3a88d23.aarch64.rpm 13f4cf9ff94c4a36b9590a87b52133775963fe327376b13ebbccde7e586d3b67 jcl-over-slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm b125935b6843082bd8c445e1950319e9b5ec76d1b05760b3a57f762706a03bed jsr-305-3.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm 4e3e833e9dbda4451c6f7d1e41ba92acde5bbb4a233ae5f617f08ff7d7c0b16e maven-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm a532cad614f39e89e5013a25e2513123ec070fc5b956102bbd3dc00eace52eba maven-lib-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm 0f74b89b815f56b1e89d03ac1b9b0f256c77723efe7aac16209b689a8e658bca maven-openjdk11-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm 61123d12dc39ba56868b094db24c5e7bae3bd49c83283440afe541e8eddb874a maven-openjdk17-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm b570e04dd05bb6febb0291828c48c3399a213bf5c7c6ca3c8cf1469e2d0c6ff6 maven-openjdk8-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm 01c706be33a63c3dfe9f3aca9163774d208cad8a5891bde4572a71ea372b8c74 maven-resolver-1.7.3-5.module+el8.7.0+1082+b3a88d23.noarch.rpm 60d9110c2e34df93e9f73495b500734492877a00caf03b83c19a0f7886d26bea maven-shared-utils-3.3.4-5.module+el8.7.0+1082+b3a88d23.noarch.rpm bf70be5e5cf79db68303554ff30f0fe9b59ea243814a15661dec4af551553ad2 maven-wagon-3.5.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm 5efa702d5d70f6a08b69d3c41c91785b35263aeb15c8bcb20a4bf26e854ff123 plexus-cipher-2.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm b780465af6320824793218270e36d0972fff8c01f426753cb3a02c602b9d4b7e plexus-classworlds-2.6.0-12.module+el8.7.0+1082+b3a88d23.noarch.rpm e09ca193b70a3ce3e18d15682d4314b8759c56b4b64500ee7e0ff1d77a172135 plexus-containers-component-annotations-2.1.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm 345a55610fc3c8ecb26246b09e9ebf6043862cdd3f4223ff42183462a374dbfc plexus-interpolation-1.26-12.module+el8.7.0+1082+b3a88d23.noarch.rpm 9e6de49efe80cde3ed4dc36d5819b15a77f429b6f0ca90cb0594e66d4eb1710e plexus-sec-dispatcher-2.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpm 4f4997c1d037cfb4180bdfc0bb54db2517a6a434a6839d0f54935d1434f46fb3 plexus-utils-3.3.0-10.module+el8.7.0+1082+b3a88d23.noarch.rpm 1c4dfffc30a7c45890df152ea03f52d0de4f878182a0573a2075bf3d65eb0419 sisu-0.3.5-2.module+el8.7.0+1082+b3a88d23.noarch.rpm baf84b90986770d39acecf7b3490d1e2f60f6ec41adaef70655b270258d2fabb slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm 67122bee7bfba76c146b1e031e6b2111173029bc7c5774e325596f3a9a8354b7 RLEA-2022:7638 mercurial:6.2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mercurial. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__mercurial mercurial-6.2-1.module+el8.7.0+1070+25eee955.aarch64.rpm e382e86b86b9e3d7c3da8230a1cc8118efa7bf5bc1268f055a4150f137d1ce16 mercurial-chg-6.2-1.module+el8.7.0+1070+25eee955.aarch64.rpm 4c7bfb9553d0633962b4402ba4f44275c755f745d1d447cbf428325a1c350efc mercurial-hgk-6.2-1.module+el8.7.0+1070+25eee955.aarch64.rpm cc0181ea2d98a743064666a82fc379ebb2025d728b88e560a1bb4d161bbc7f83 RLSA-2022:7639 Moderate: openblas security update OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openblas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms openblas-0.3.15-4.el8.aarch64.rpm 43ad4da9527f95d80b5cd6b3d31999b68caf7ab246d176290504e9cb7854a8c5 openblas-threads-0.3.15-4.el8.aarch64.rpm c2557b9441b9a503639d380e0de354d2fe5217985ec33f1de47f28b6bfcd31d0 RLSA-2022:7640 Moderate: mutt security update Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mutt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mutt-2.0.7-2.el8.aarch64.rpm e66074818bb0ecdd76d285181936368458508bff0766b7ece32d437fea727d50 RLBA-2022:7641 fstrm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fstrm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms fstrm-0.6.1-3.el8.aarch64.rpm 28b9897b770d1991b1a6837a66b2567cba9cf75bcf75b97da6eb5216a757bd96 fstrm-devel-0.6.1-3.el8.aarch64.rpm ca607a14e0d3b012ccbb85ae7afe8cb5b7ddff75e079a76c25b7ddd686d2ce8c RLBA-2022:7642 setroubleshoot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setroubleshoot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms setroubleshoot-3.3.26-5.el8.aarch64.rpm b078c9c810ea7664dbe800a5519cdaa6ec58b904775fcfa325cb8a1ffb762001 setroubleshoot-server-3.3.26-5.el8.aarch64.rpm d058d311b5535c73a3254031a33c6fc65866c70b652554a42337f535c12805e2 RLBA-2022:7644 clevis bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for clevis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms clevis-15-11.el8.aarch64.rpm 2c3fc9ccccecfb6c60affc258716713cde1ca8b65ea5cc986639977f295c98df clevis-dracut-15-11.el8.aarch64.rpm 029bcd712ab8c51e305ae6e2ddc651883270f17ea2369db67fa6855ee4df0d71 clevis-luks-15-11.el8.aarch64.rpm c66bb94cedf41ccdc684def80898154427cd675d556b4f499a6aa536df5e4b2b clevis-systemd-15-11.el8.aarch64.rpm 8f6290c9e05b96c110ddcc9b10ef0d1ab688b4cff34bbd4f2413d813cc60e59b clevis-udisks2-15-11.el8.aarch64.rpm eda0c12119baba6c89e1d82e231ea8deb56e82f53407edbacbd65fb9eb1c038b RLSA-2022:7643 Important: bind9.16 security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind9.16. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bind9.16-9.16.23-0.9.el8.1.aarch64.rpm 527171adb34b18a4855c3a44efa9b9996940c5b8b549fd3c4cebfa3148c9e868 bind9.16-chroot-9.16.23-0.9.el8.1.aarch64.rpm f1f1d3d7bb851fd6329cbf6b8abfc2d3e9d70b02c6cd1f72ac2034749b9ed958 bind9.16-libs-9.16.23-0.9.el8.1.aarch64.rpm d35010b841488cf848683c84daadce0adb99bf15b3d9004ca75d1e311f87d348 bind9.16-license-9.16.23-0.9.el8.1.noarch.rpm 02cf60bbbf5a798b91a297d13987547563cd82aaa7f011b8edabc8efd7ac0988 bind9.16-utils-9.16.23-0.9.el8.1.aarch64.rpm b204f912c3df7b2b26c7afafbafe6cb1320f21f4724675d569b4879b7d201283 RLSA-2022:7645 Low: openjpeg2 security update OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for openjpeg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms openjpeg2-2.4.0-5.el8.aarch64.rpm 941895706de4d54c514150b53d729e7c263667bd64d3b20245dffa85eb72ec38 openjpeg2-devel-docs-2.4.0-5.el8.noarch.rpm 420b2ee00501e932ee6e6a43f30918ec8359f6936a71181afcbd500f4cf1d307 openjpeg2-tools-2.4.0-5.el8.aarch64.rpm 2fbe059954185097098bc1e0422690f9b6512bf5b50c130f4f2ddcd072790dc7 RLBA-2022:7646 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libblockdev-2.24-11.el8.aarch64.rpm d65a33cbd7511662ce715fec7dbafdcc2dd720460e85aba8aa0f3f46d081fd0e libblockdev-crypto-2.24-11.el8.aarch64.rpm a4a7870232d0c3516bb25e148f13a7bfaecee36eb78af126c9dc000e3bce05b8 libblockdev-dm-2.24-11.el8.aarch64.rpm 8eb1b521b94895ddd9dfdf5856375bd01606a3d36c6e6bc8b70050b0f303fbe5 libblockdev-fs-2.24-11.el8.aarch64.rpm 608a3f4bcf3aa116d08c4544db4cf8a01773feaa005087db9331f2237bbf1984 libblockdev-kbd-2.24-11.el8.aarch64.rpm 1c6e1023ebbdccd8ef6275dd98bd06295dbb8cfd61628c7ef61c01909ec2b229 libblockdev-loop-2.24-11.el8.aarch64.rpm 91b7a962898308c7941f783f889181b8252ec4d47b1b889666e0cb5620f810c2 libblockdev-lvm-2.24-11.el8.aarch64.rpm f188672975a0d599ce88bf8c43d0b29e25214fc5e2e6be57b0b0f7870790d7ba libblockdev-lvm-dbus-2.24-11.el8.aarch64.rpm 539b36b4862b477e4a5a4fc1029aaa27fd5ad06e37ed37ae9719d105d0b117bc libblockdev-mdraid-2.24-11.el8.aarch64.rpm 4b6c7515d46083ec5a0367f57dfd3c4e5f730e20ec4ec46924fcd50ef938a4db libblockdev-mpath-2.24-11.el8.aarch64.rpm 2861b06f252ca25faa8c886a881fe7b0922b1027617cf267e800579acbf9f1ac libblockdev-nvdimm-2.24-11.el8.aarch64.rpm f7588167714d06b1cd62145876571ad4a53dd2213d423fa70fae745b6fb3fb2f libblockdev-part-2.24-11.el8.aarch64.rpm 4782cfa42287971c6a469a28de8b367d112dd981ca22de22a30aaac01d37c5f7 libblockdev-plugins-all-2.24-11.el8.aarch64.rpm 7ee9cb6a0222e7c14fc7da2bbce8cdd131997c4eb350997a545cbd00b9dc093d libblockdev-swap-2.24-11.el8.aarch64.rpm 5014db8fdd8b2daf377eea055778b476a4a8c6d59013abb1d099ab0a9fe55e63 libblockdev-utils-2.24-11.el8.aarch64.rpm 82dd38fe6997b65dc8d076629dbe9578ad24b5433ceb2730e6cdff04e16808e2 libblockdev-vdo-2.24-11.el8.aarch64.rpm 9aa6c1eea034a7e92c7b92ad21862a6ce410a71ea495e290a30c5cc5b458669a python3-blockdev-2.24-11.el8.aarch64.rpm 1a1f77846f20f164d841302a9d78daa0c464484b063fb81610820cea1f32bb62 RLSA-2022:7647 Moderate: httpd:2.4 security update The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for httpd, mod_http2, mod_md. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms__httpd httpd-2.4.37-51.module+el8.7.0+1059+126e9251.aarch64.rpm ddd25aadb6aa90f7a9d91ed19fa571b76624a9360797be005522b3107617bc24 httpd-devel-2.4.37-51.module+el8.7.0+1059+126e9251.aarch64.rpm c6d53921a14840e58b457c8836a2646c62a21a6a71b200fccba7f910d7fe7186 httpd-filesystem-2.4.37-51.module+el8.7.0+1059+126e9251.noarch.rpm 969b64b86a34667e267ddad1ccfeedb854aee00abd1df97cff27c360b9cf96b7 httpd-manual-2.4.37-51.module+el8.7.0+1059+126e9251.noarch.rpm 96cac9b5c3a2d5e9b9d363dea0eafa48628bc52d7f5abf8fc9102c2c7baf35be httpd-tools-2.4.37-51.module+el8.7.0+1059+126e9251.aarch64.rpm 0c1cc858a589111e354c8eb041abb945b4aa3f19bfa370febfeaba323fc6b091 mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm 9e61f8a994beaff9e74f4d92034eadaaefdb3eddc6f4916a41f4158ed613d6bf mod_ldap-2.4.37-51.module+el8.7.0+1059+126e9251.aarch64.rpm afbf9872e636187a98dcbc481e02138b46e309ffc27b169d1b89b897de2dc618 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc mod_proxy_html-2.4.37-51.module+el8.7.0+1059+126e9251.aarch64.rpm a9a65d7433e36f9d8378c126b520326d373ffa6ef46ba65fed213b27de09781c mod_session-2.4.37-51.module+el8.7.0+1059+126e9251.aarch64.rpm cbb4c46df073f97a9d0fdcefe234098be0f1a04897dab4318229b69a5a5aa631 mod_ssl-2.4.37-51.module+el8.7.0+1059+126e9251.aarch64.rpm 49fbca970524a42f7767523e2ecabe8500ef1fbc4a8a2649cdd69b299ecb4c93 RLSA-2022:7648 Moderate: grafana-pcp security update The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms grafana-pcp-3.2.0-2.el8.aarch64.rpm 650a09efb000444f21a747aab5c5b56010410e80feabd72514531e9e14a5c3d6 RLBA-2022:7649 hyperv-daemons bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms hyperv-tools-0-0.33.20180415git.el8.noarch.rpm 19683e1b36236c96fa80542addde387c50505b96bea2c08cac8b3d3891603b0f hyperv-daemons-0-0.33.20180415git.el8.aarch64.rpm 5e2d03eb0db5fc335b907a5688c6bb0cfa6c07549c9d3429b6c354e510fb9d0e hyperv-daemons-license-0-0.33.20180415git.el8.noarch.rpm bfcda3489995f231a5c8b1a414acb58b0c74710fad37bf9725e8ba18052324d6 hypervfcopyd-0-0.33.20180415git.el8.aarch64.rpm 54af4abddd52549a12544405a097af1d7bb4500253cf63068cba7fbc76a6e3b5 hypervkvpd-0-0.33.20180415git.el8.aarch64.rpm 2370b947a6e32b18830b929e4e20eed32fa81952513f942fe9e395faeedb5664 hypervvssd-0-0.33.20180415git.el8.aarch64.rpm 15ae34ea095e293671252ea62be9aa6433b78b3cfa0767759dc7e9a6fe1df344 RLBA-2022:7650 xinetd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xinetd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms xinetd-2.3.15-25.el8.aarch64.rpm 99a8da372464dd14ac8d52ab0856ba7b0eeb3d9de0c21b06e41c6c8573a1a449 RLBA-2022:7651 cyrus-imapd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cyrus-imapd-3.0.7-24.el8.aarch64.rpm 2fc35904cec0b843e77e718b2cd81b4e74cb494d8add7c0afdac7434cd3499b3 cyrus-imapd-utils-3.0.7-24.el8.aarch64.rpm abb6a4b248fcf89a00cbe36d2dba7d5c23acbce93d4ed97b0f475243ba778a98 cyrus-imapd-vzic-3.0.7-24.el8.aarch64.rpm 265d8ec31ee7a206e01f0218e4e7eef9c17097db8baeb72492affb3e9cc5189f RLBA-2022:7652 oddjob bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oddjob. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms oddjob-0.34.7-2.el8.aarch64.rpm a0850038c0656d584cd2a50d440fb85a7cca7037547ee6dcc329f90681c973cd oddjob-mkhomedir-0.34.7-2.el8.aarch64.rpm 93bab0a63b8de66c3b2222dabde87075520d637d1079448270ae3c8a841388b8 RLBA-2022:7654 rear bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rear. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms rear-2.6-7.el8.aarch64.rpm 9966f00a65829989234302eea76416dc930bb60fde58e8be0201b57ed7a48e58 RLBA-2022:7653 cups-filters bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups-filters. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms cups-filters-1.20.0-28.el8.aarch64.rpm addca2d8004021bbf6589dc5ebf109e9630b829c8b3a32492ed93757fc105fef cups-filters-libs-1.20.0-28.el8.aarch64.rpm 5c6cff7732632cef8d0af3fa90a49dc0634eb8b7f79e9d7b40dd1fee99e91fbe RLBA-2022:7656 ansible-collection-redhat-Rocky Linux_mgmt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-collection-redhat-rhel_mgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ansible-collection-redhat-rhel_mgmt-1.1.0-2.el8.noarch.rpm 4d3548a092ce08108d8e84f1f8b244914491b05e0bdb386afbac45244b4e93c4 RLBA-2022:7657 openslp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openslp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms openslp-2.0.0-20.el8.aarch64.rpm 963d7c184f6e8e163cbfbe3145fbdf17d35260c3c3a0e60934abdbdae15e4da4 RLBA-2022:7659 gtk3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms gtk3-3.22.30-11.el8.aarch64.rpm b14522cf622b03084d186d705105d24b583814c1ae2cbc665a4c3e9f30d9555f gtk3-devel-3.22.30-11.el8.aarch64.rpm c89b70c1d194afcc533881934382624630db40e1a612cfd8220c1d41bc160274 gtk3-immodule-xim-3.22.30-11.el8.aarch64.rpm 7449de8b88fe22b97aa6bb5239613a75818f3ae2cad5af0e99fa9b3a5ed8b3ec gtk-update-icon-cache-3.22.30-11.el8.aarch64.rpm 3ee492457d64238878768aebcc6f73ffd417702337030dbf1fa78f2fa7e9e93c RLBA-2022:7658 freerdp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freerdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms freerdp-2.2.0-8.el8.aarch64.rpm 2d3ee105c79102e300ea620e76e63ab4684e42e7ee301f7ddc0236ab0d94c00d freerdp-libs-2.2.0-8.el8.aarch64.rpm c92a1ec0d2a5305e5028578c471b840020ee9b0b297a01f102a8b1255015bfaa libwinpr-2.2.0-8.el8.aarch64.rpm 9c9dc7b29c504155c141867ca340603ed6c8ec3228862ea99936cb312f0c599e libwinpr-devel-2.2.0-8.el8.aarch64.rpm e246ba628c3dc7126b036ad147f149885d0b1d6257cc6458f9adf4267e85d58b RLBA-2022:7660 coreos-installer bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreos-installer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms coreos-installer-0.15.0-2.el8.aarch64.rpm d5b6f7307c163d276a0335244bc3154504542377a26cd82df2165d6c06802962 coreos-installer-bootinfra-0.15.0-2.el8.aarch64.rpm 79b21ac43e3b6a3ab1a93f8b24830085866b3e59f39179febad9248e4212cd71 coreos-installer-dracut-0.15.0-2.el8.aarch64.rpm d736682c37363d851e9c22270f52e2481086ef808f6475e09d35b7e7230f2f88 RLBA-2022:7661 vulkan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spirv-tools-2022.2-2.el8.aarch64.rpm dcd2a0a8108642cdaad04eb8be2ea5cc3dcb783c4a6ff11d50547af23932dbc8 spirv-tools-libs-2022.2-2.el8.aarch64.rpm 006d1d68f97c8128a3c32bcc05c094a30fd6e3f20f76a06ae24eed60cfe62a03 vulkan-headers-1.3.224.0-1.el8.noarch.rpm e19ab508f27e871a450a0da79c7a91ec51619c85a590b8f1c6eb10efdd9928c3 vulkan-loader-1.3.224.0-2.el8.aarch64.rpm 6f6cf43d60ffd3c6fbab9126e867bb632d3b80c8f2f55ddc08ba55939ac11caa vulkan-loader-devel-1.3.224.0-2.el8.aarch64.rpm 1ab2a9022cb4eb24570c93988d5eb425694a45c5ffb9c4cbbe6e3b669369ea82 vulkan-tools-1.3.224.0-1.el8.aarch64.rpm fc86a08624defd8f0e2bd8e04b8baf916664c8e7257dc798f86feb273635769d vulkan-validation-layers-1.3.224.0-1.el8.aarch64.rpm c92890395909f07fa37364b5af259eec77de52cf7a405a811142453233145f43 RLBA-2022:7662 opencv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms opencv-contrib-3.4.6-8.el8.aarch64.rpm c93513a1da67fcdef358a8a64c3117ed3dae04d70a6561aff62d58527a8d54bb opencv-core-3.4.6-8.el8.aarch64.rpm c723403f53ef1ffdf4fdf991da1fc2db590dee2714cf125a44cbec2a7c71a985 RLBA-2022:7663 wireshark bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wireshark. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms wireshark-2.6.2-15.el8.aarch64.rpm 96a09afe563bbfd5b84c507b8d859176130643347f95ace61845b0cb0a2cdf08 wireshark-cli-2.6.2-15.el8.aarch64.rpm cc16a3f3a64626526316b2431d6e48b82b215e0eb8ee3be1cf8e99012014d9d2 RLBA-2022:7665 ksh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ksh-20120801-257.el8.aarch64.rpm d5679ca2e9f82d4e597b89b8f7044b5ff294e0ee5a519ba42595fd7e5e26c6e6 RLEA-2022:7669 ipxe bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipxe. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms ipxe-bootimgs-aarch64-20181214-11.git133f4c47.el8.noarch.rpm 0118e505403e318795ce056e565bd8acacf6a05b3b52082eebe1b452b4ebb7d2 ipxe-bootimgs-x86-20181214-11.git133f4c47.el8.noarch.rpm 7a4f1b8be52f0b60fb7fc53bf312f2862ebdcb43b7442b8338fd5d5254a96706 ipxe-roms-20181214-11.git133f4c47.el8.noarch.rpm b0552e3664dcce3ec599db80dcd3335add473fcff0c2a3f2d0e172bd75595acf ipxe-roms-qemu-20181214-11.git133f4c47.el8.noarch.rpm 402d256792a02af43415b6cfc9bd1db8696705abe9cc28788f3242e1cb9e4ac9 RLBA-2022:7670 mod_wsgi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_wsgi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-mod_wsgi-4.6.4-5.el8.aarch64.rpm 2a8b3fd1ce78c67b895a9e0a360e3633155808032404b453db58350233bd42ee RLBA-2022:7672 spice-vdagent-win bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-vdagent-win. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spice-vdagent-win-x64-0.10.0-6.el8.noarch.rpm e53a14bfa86f429777d1d730fe86662008a8aeee8e73fbffd23f2fc3b16e6ad6 spice-vdagent-win-x86-0.10.0-6.el8.noarch.rpm b1814db118569b052f8164d9c00c49172ff49a87220300bdcbe768474daae489 RLBA-2022:7671 python-simpleline bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-simpleline. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-simpleline-1.1.1-3.el8.noarch.rpm dba9336ea7e7bf54b9f0f09bec717744c20f9506638c9786e60274c1cc45b037 RLBA-2022:7673 wsmancli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wsmancli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms wsmancli-2.6.0-11.el8.aarch64.rpm 462cffb60dc4636c55c19fbdd8c98a982c7ac4c7e7dff0d84fe2691f4eca48eb RLBA-2022:7674 openwsman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openwsman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libwsman1-2.6.5-9.el8.aarch64.rpm face76f147a1a5f723e865af7d07ebea72258e1b729ba1315dc1e0058f779260 openwsman-client-2.6.5-9.el8.aarch64.rpm 277143349fdeea06e05ec8a4e46d9008044b23e9639d1c3b4c28d72981d1c39e openwsman-python3-2.6.5-9.el8.aarch64.rpm af002548196dcf4db52a6dc62b2fcef09149502ca882c1bb44f54230cfd3cd89 openwsman-server-2.6.5-9.el8.aarch64.rpm 9c6f2e032303046da2367fe782f79c5d4ddb6555abf5aea989b3454b2596b7cd RLBA-2022:7675 spice-client-win bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spice-client-win. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms spice-client-win-x64-8.7-1.el8.noarch.rpm c98184f6376baea38a779a93d182d916df079e69871e6fcfc7fc7def6d9dc27d spice-client-win-x86-8.7-1.el8.noarch.rpm 1c0d0e51603717d6074c596f9ea2cd6a94709153ae7d5abbfd08563e9e14d870 RLBA-2022:7676 prometheus-jmx-exporter bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for prometheus-jmx-exporter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpm 85d52b6eb723113b6ba471b2ca26afae713997a89616d57739e7498226fdac71 prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpm 764abbe69bd693ff8794e3c9fa5fd5b609be9ba1e896ba02ed4476d2efb61dcc prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpm b252c5787fa070f1cad64f473a492dbbc981882ac49570b9a1b5b5bb9596a7a8 prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpm e747522630dfee8d219dbd8794386cd774564f4cdd5b688d3e4ee255c217d91f RLSA-2022:7704 Moderate: webkit2gtk3 security and bug fix update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms webkit2gtk3-2.36.7-1.el8_6.aarch64.rpm 4a5a67f966a3d3d81075bdb5bbf0c0129e58f5ee9a2e09efc41669eeb5f5d0e0 webkit2gtk3-devel-2.36.7-1.el8_6.aarch64.rpm 4fad8d7d372e24cb26ebe940a64ef947f82f11bc4d836d66a3d8bd207bf541ee webkit2gtk3-jsc-2.36.7-1.el8_6.aarch64.rpm 8a8f5ba335344ac8b68567c1696e92308461a9d52325abb42428cf3fb8ccad98 webkit2gtk3-jsc-devel-2.36.7-1.el8_6.aarch64.rpm f307c0414d165516239e2acc281a2eeb57877c06a5b8f55800719563922699c8 RLBA-2022:7820 virt:rhel and virt-devel:rhel bug fix and enhancement update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix: * irtiofsd debug log's timestamp is NULL (BZ#2132391) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix: * irtiofsd debug log's timestamp is NULL (BZ#2132391) rocky-linux-8-aarch64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 54ac9d5ff7cfe04c8c978174304f3b769c6ebaffb5b4867452aaedb5bb405fe5 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 991c3ced4f9f62071fd55347b204cb02700ae6a92105be95b5cd7f8461084189 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 09388c2d5713d49f885e6b3392307fd58da74d7b6fa6f7ce849e9f18b1b49859 libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm b79f399f3d02e0dfce20a6aaab6b2ff35cb2bfa703c849e327f551bb88d34842 libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm f18c730bdd58dfed86528796516c3542ff9986404d707eb43f85638ef46fc576 libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm a7eea07ba1cfed5100b2df5c7b692d238ba5dc8a818d9a567f5238c135182fe0 libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 90c229c3e85f9d9926413433f7fc1831d5197fe26e1c58bf17bc328da032beb3 libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 9d75b7a60326f8d407640254c611454c5c98617a33ebdbb92f309ee92661fb5c libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm ef7a76cd0531268f356a633c8baa9ed9a65fb7ed0f73225c0850a04e7db7e9da libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 739bbf4afd1555b117b4f6de59671d04ec0667bcdbb22cc2db39ee868075e626 libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4 libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8 libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2 libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm e7a5c7078adc8a316314da0574b495d50c85f0ebf512cd6b2fff6a9c0a5ca920 libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm b15b0dc2907d618b176770530c099b0067f26237906aac20de5e96b28deccaf4 libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm fcf5e04da8b2e33d35b82ad8bcc66fe5a34f7a1539484d14f86f49c1d1161bf7 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.aarch64.rpm 9496f010dd51c309e35489e4b2b4eef9ca205efe10f699e727ebbb87f3216495 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm fdf9b549dff4877676996cf0a5cdc17d751131383ac7e5ab0cf2b219f28b4f85 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 1d38a90c326e379f852440694d829d9df286e82f0aaaf7a20cf01a1dfd7253c2 libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm bc267e62ab3f58f101086759be4c2e23d04e1ad223dc3e5f9c3e612413663d4f libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.aarch64.rpm 02d772236564532af47919abfdae6f5373aae34fe7cdbed742bc4fd95ed8e361 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.aarch64.rpm 65bddcfe7c8336ec5686801ae92ca04f3366f8be416fd043311af9223477c910 libvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm eff33094d40123bce40d5726822aa32625b15b459af7d56cccd8616e5ca61c86 libvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 5a89f231fbfc4491340ceafa25c41bbd7db9a17ff7947b7a99d16cd5080c61b0 libvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 2561be37c3977256dca246ae9e374c97c1621d85aaffe1b0b6744aa71c3bfa69 libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 0574d23fc6c1d769b74ef5f7666125a7b301edb1801434cbf19500ab92ebac90 libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 2c502b05ebbb9e853db1388113851a46369b929d38b0ee23e8f4f3305518c1ec libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 40cc824dd514ce22b14c3f1ad1b8d6df093b60334deeef71d2dc96b7436f0fb6 libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm d03b37b391a04422c49150ec5cc5717220a2b6d0977a46e81b651a891040381a libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 42c4dd97d284866e50e63d2d1db98e9f63c30d59467c7ea43ef8ec76c29552a5 libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm f8942bcae8b750d81ab1b99f66b7062b33f99586024364b16928bf48bd1ac113 libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 1e311faa3eba6f66b1a685d9a0e09e5c88eb8b39d355861d9116f71c14f57dda libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm faa40f783c8ab56b2777c666476b9e205f94631e5c45b6872bec7b01c12c4346 libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 75b6261012555bde88fc4aa77ad2810222feaceaf4bea8fa890128f13aa1e798 libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm c9909bf8848bf6edb5c727282770d701faa65f0a19b3baa92c176ddce51ef7af libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm c35c5153db7d750177a505071110e8e26b0a55cab4e756fd03d2a8e856c206ca libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm cff288b3a34eb2c3de5381bb02812268fe67cf8af5cb1322623de5f6ce36af77 libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 8dd14cf5b3225f5b0dfd5fceaebb699b7f709e27ec768c98b2e7d4cd17c4a9fd libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm ffa765df7a2b1b36e8cab126087e10d5f0acd4d90c476845ab191626383ff82a libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 7f89e2fb5ec93a69cc5b11f6b8b4837a7726872fe65b9dcd32f50c6cbfabe0c7 libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm e7df50b677f8a70716841bcd9433dcbcca6b01f3327ad6bef5fd1c1fae43f801 libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 240f422eff6c62d133d9d7c0051d2c8988268568ca658c697d083d289f92a9f2 libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 524a0e0e7cfcf28a398217580b9c0aabba12339a400380032a0176ecf3413eb2 libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 7895c298bed879f013ec35b384d50680860a7376c5e94167ea98fd3d74ce402e libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e libvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm bab033ce89df302994f4cb3904d405281405516558c17b1d841cbed54286d310 libvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 1aa83fafddc0692a0f9c91926df1e67f4a5a0f6b537800f314cc0e9addc9664f libvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm e8c8225e786675facd5c05cab7c472df7310a6b57914433b15e1fdf5f0ac9ab0 libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm cb174b6fa3b5866e99b4eca46382f1feaf3deb25e7c2bb8a22e475f4ccba6e71 libvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm d94dcbd7fb85dda7bd5a67374ddc96a38570a9417d2327210da9c11ce211618a libvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.aarch64.rpm 56fd1ea1ac63443293992cddd90cb4fce389c043a63d4f1911e500955f10a06c lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 440b4fd843f1600ab2a3a8620e8999414c5dbd7ff0a5315ce30cbe52a76eca13 nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm aa5c62e3fbf5ea23307d97e22527f643ceeb7a23ec6cffb8db277971bb87c570 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 857f74550b7100f3bbcb5838ebc3cb625b83804004286b1f4fd7c1b906d64b6f nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 7896e82315caee8ad9bd2644e530296ee622c2ddfae688248185723907e137a2 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 6f525884975cabd1580c6a8d697ccd8c045c659534a0c34c03968e9a21412908 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 8191bb3746b674453d36661d391b8c0e10a95f88c217921f9432d6b8a8bb6843 nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm f52b83ae63637c8b1e7315dfa0fe510aa51b78cc05ccd97b300434e0a28b0ea2 nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 1e49c7614560043aa959388f4518b2768e5425b8f9739ad1140006e3d655db8a nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 0aed2f62163a1ec150571397fd8d769bb51779ad3ef7fd52607a9757f0fd888d nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 766fceeadde01aee98d85e19c6277e616e069ace8b4c11779fdc56c79467bc2c nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 5b25ecac75ab91b2d379ded7bdbe88a94684e18f6061e7cfaed0ffb2946c6096 nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm ce3e3ee3844c0029598e80ba43fbe8f50c0cc992aec0e13d8c6637f171372f53 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d576ab4e2f4ffc7807d2cb0f6e2e25e87c236f476b1a78fa91a9e17f037da641 nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 452bfe16a3fa75235912bfa04b4f11556baee490f77e6321de7e153ac97a5fe8 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 94287915575db12bf71b263335af6131786ceb4b9b92e9c28fbbe8527c6946e6 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d16e4ac2b791ac7c9e318c529447913de8ca95449e1202c8cf32fcbc3cb397a0 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 916e69a5b2bcc4d8b0112922078774ffa5dfaf7f9973df775e1f5ef51b21b382 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 338678cc1b9159003aa7d2ea580f7d42e39a1e5ea2330a84878090fff1430425 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 3c0620998763169c5353c90923dda89dc3de31163c58f37c31baa00b2af81c22 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 39e68e387399720c563214f0b66f299572f479863300baf82e484bab46b46c9d perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 52a5808bde45ede583a0db96e7f97248c0580c696bf130e876599b9b23acc320 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.aarch64.rpm a142f30b346e5db77d4f5aa919920b3df24522a614c785efbc8a97df64ae5199 python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 3196143c842626a0a65c59ed1a7d1f7968fce62336a46d65ffaa996eaea74520 python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 9a3bb24f836e37a82ae94971bc9a3a91703c6994c675e687c3b98890f14ab20a python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 430e283968d39a981aac03c2c50e95f1adc9568bfed209ff0c948714a5a2710d python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 344571b98f62a01a4f3e496fb72b2aee5cc5d176ec1886b7084d1a7cc3e67436 qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 56bc8ded46f383ae7010cfa68f1b63bca7444386136411c05ab653f8bcceed16 qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm b86ce1538a7e86e25892cafa821a40a51a3060b6b2338ac33fc77ffe490ef398 qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 86bdb43889e488440a401246b21d336fcbf59f3c8847789dc8e619b71c096e12 qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm f515015d9adc8c11e69b71fc4c57780ed8fec77301a6336da2f1f0259878ebe4 qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 0d3aafe1997ad03ec93e046a14971f8ee5448b902c2542dda792015fcb3e42fb qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 596f71a855faf3468df8f67f985bfedfa7c8b0c07a2247b6c5ee6e2859c19256 qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 331c2ba5e40ba881026c0ec1fc8f7de4f0fd204fa410db3846cab89195e437cb qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm b5d1e3a3fc7f5bc978f6d28f72b92beb634109273ab2c95d09107b0c7d219fbc qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 24204ad12f6d1603e1fbba9630ca1f186d455d74652fdcf73e47290602299736 qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.aarch64.rpm 74bbd328b8201c540395a681ab50beaaa3cc2769c829e3b3f9b548be89fe5f93 ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 9779f9da2de53bef16886c338550c88e75f3ae8884abcb437e45472ff604ab92 ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 170624a8f7de11497719a2006c84a9a455db4935663c1ce6be6d4bd7dd6a7ae2 supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 5f0207b3793a77832c80929494fabaac45b48439c31e59270e7354efb7e16d73 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 4ee91ae1900c19ea16f63ecb68516f8e57ab573d4ddfad831a61eb3797c3fe3d swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 55da933062600cfef45df3e4a68d652e0a73d8e1054ecc4ae8540e7ec2da8e63 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 54bda5e86eac5c5196b4aaa5b58fcf2a664e5298d0653f3613e13ab8f93c0563 swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 46cc83ca8d215f72133283dc69c760e7a6d90d6f529dc1c4984eb138c4e6cedb swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm d49f7fed94d56270745f8a36eafcc91e9ff1d388518728e049285540e7332785 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 8e0ea3f78c79b3b7ee562fc46f2ea3a9a8a75cbab5520de2a44b87668866e466 virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm f80dd339df16120425aa5b44a0a6bca5364a298e545b6cd4be988acf90d3517a RLSA-2022:7821 Important: nodejs:18 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750) Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.9.1). (BZ#2130559, BZ#2131750) Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-18.9.1-1.module+el8.7.0+1072+5b168780.aarch64.rpm afc6cb3b3cb5c7aafc7f3742a943b873345fb7f55e45f198c9cc9cb41d4b06d4 nodejs-devel-18.9.1-1.module+el8.7.0+1072+5b168780.aarch64.rpm ce12576b18e2a67614bdcc201d84b645c31dcdf2ebcccaf965d482d3234de42f nodejs-docs-18.9.1-1.module+el8.7.0+1072+5b168780.noarch.rpm eb458813c72a7d63c698cc201f1c65840d6629edfb5a88822754d698b61fdb64 nodejs-full-i18n-18.9.1-1.module+el8.7.0+1072+5b168780.aarch64.rpm d739e6703bf555d90ea142b757129890e48255d86267f7dbdafd2ce358181603 nodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm ec2f3e9547f189b1ac35d0ab8b0f84f81b80eb6639f17bf9a84dafea7dfe4e18 nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm 0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2 npm-8.19.1-1.18.9.1.1.module+el8.7.0+1072+5b168780.aarch64.rpm 2c9de7ef4e596398550664e433fcdb592a06b64b84635277c16c9c21d37dfc44 RLSA-2022:7822 Low: container-tools:rhel8 security, bug fix, and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: possible information disclosure and modification (CVE-2022-2989) * buildah: possible information disclosure and modification (CVE-2022-2990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644) * (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645) * podman kill may deadlock (BZ#2125647) * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648) * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686) * ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234) * containers config.json gets empty after sudden power loss (BZ#2130236) * PANIC podman API service endpoint handler panic (BZ#2132412) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390) * Skopeo push image to redhat quay with sigstore was failed (BZ#2136406) * Podman push image to redhat quay with sigstore was failed (BZ#2136433) * Buildah push image to redhat quay with sigstore was failed (BZ#2136438) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295) Enhancement(s): * [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360) * Podman volume plugin timeout should be configurable (BZ#2132992) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Security Fix(es): * podman: possible information disclosure and modification (CVE-2022-2989) * buildah: possible information disclosure and modification (CVE-2022-2990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/ (BZ#2125644) * (podman image trust) does not support the new trust type "sigstoreSigned " (BZ#2125645) * podman kill may deadlock (BZ#2125647) * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 8.7] (BZ#2125648) * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [Rocky Linux 8.7] (BZ#2125686) * ADD Dockerfile reference is not validating HTTP status code [Rocky Linux8-8.7.0] (BZ#2129767) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.7.0.z] (netavark) (BZ#2130234) * containers config.json gets empty after sudden power loss (BZ#2130236) * PANIC podman API service endpoint handler panic (BZ#2132412) * Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 network (BZ#2133390) * Skopeo push image to redhat quay with sigstore was failed (BZ#2136406) * Podman push image to redhat quay with sigstore was failed (BZ#2136433) * Buildah push image to redhat quay with sigstore was failed (BZ#2136438) * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-8.8] (aardvark-dns) (BZ#2137295) Enhancement(s): * [RFE]Podman support to perform custom actions on unhealthy containers (BZ#2130911) * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2132360) * Podman volume plugin timeout should be configurable (BZ#2132992) rocky-linux-8-aarch64-appstream-rpms__container-tools aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 89302202bc3c8562e0e66e3e2dc7ceb2682a99e8af72912f9291a4480dd7d673 buildah-1.27.2-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 788fcc6b8ba7d2c19ff24aceb97436ba356153ba02df0350354784bfaa5530af buildah-tests-1.27.2-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 519a0b538a94a55f30d7c09038049ba68a128dd6f3c6326f68ff65c41f89492d cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 662cc47181d7447f4eaaea4b4dd6b83f13613356445e44cda5ba787fb8b9e3b3 containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.aarch64.rpm e25d4aa99de7f0db48d671a34f066cb910e4569cd41c644125ec0de080b099ae containers-common-1-43.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 87c0d67cd2e7ed31e87d87a548b961811228fe029a36fcf36b5091fcdc1d51fb container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 crun-1.5-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 77149ef788493e72d83884f08861eb37fb381af478f8e209bd5b36c3dc9b1fa8 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 22b098f5278453b8bc2f7e9abcaeb06996ac1fdf8881e73a971721abdb8373e5 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 1fd37ac99e41c66c08b163ca39c78f32c6ac9cb79f862bd555ee7b77a0fc54a3 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 26cfb89e3c1d1e6b25a7f7e40bda6c34c42a141b2ceab4b2d16de8c8a6cddf4d podman-4.2.0-4.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 8283ec2766564cf4579c86f1baa15c38dc2802a7ac24320a197cad174a847acb podman-catatonit-4.2.0-4.module+el8.7.0+1078+e72fcd4f.aarch64.rpm e1c721390d7294cdbe20cac01c577cf4a3ed705fcce74c1090788927270b1afc podman-docker-4.2.0-4.module+el8.7.0+1078+e72fcd4f.noarch.rpm 3ab74a5b0f60cca22c86fd8c1f9d0b1a93d7577fe73545eefd1716271c0bdd12 podman-gvproxy-4.2.0-4.module+el8.7.0+1078+e72fcd4f.aarch64.rpm bba05e4a21dac56ac87a58d74bdca77b45f72c0c2a421e53431112a63d4e2daa podman-plugins-4.2.0-4.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 2384de1b51b641f8d396d8746fdba2cdd23f179bb63b3b0bdde18a7492e522bc podman-remote-4.2.0-4.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 994da4baf4dbbd9d1ba4e17d4e1909b688ea3ae261790706bf9eb480195a0de3 podman-tests-4.2.0-4.module+el8.7.0+1078+e72fcd4f.aarch64.rpm a4a7017d34b250f9ce697ca92d54f2237ebc982ccfea8b1747e35277b70743ae python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.2.1-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b696d0f504dd20e219ec48da145b4324efcc4ee393ebd32de98cd14f7aba3d9 runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 78f1b16f78b9fc7adff79987cdb193a2e5c35dec457c8260a6d52fa9f0c3da69 skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 9265cbcb6f7d1680c0e26a28e2f260156b91cf784599e6dd6a0884b3970fef61 skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 2c55b66567c2ef5a45d89cb6d1ddb9e8c8f08fc224ec83f4f9f65c3d6089b74a slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 30313d29e17592d71da2f4779933f1dbf9b2adb048ae6b8d3053d93e069552f1 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 73cd6a5207f2527d63739b30acae92e0f1fe13a6889a7a677bb30891089c3e32 toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 918efe0ebc91b2be593ebd21bd4ab208d02fe9383aebe20f3dd02c5ba61cc1ef udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm c583176810c44a0b2299f2df8284d203099a57bec1d571723157fe12bab3fa5b RLBA-2022:7091 java-1.8.0-openjdk bug fix and enhancement update This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.aarch64.rpm 7ce2d03cd20aeb4037864a887682c387e2a4bcc64ae26f26f2ab0b6837f47bbb java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.aarch64.rpm 9cbbbb4f6fa75383898eefda3ea318d11680cf24e5cf79f078c81994c677b4f1 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.aarch64.rpm 14bcac44131db59636eed4dc9a390bd12ea598c93e793f93cc132c904c1815a7 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.aarch64.rpm 58839c66dcb40133472e02900acead6bc401fc31ed6f3385b00fb615bd58e147 java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.aarch64.rpm 44857f2bc052d42665e382d9a9d9175c3cbcd7c0b0b91c496d23e9b192c960af java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm f17b77d4203cf1a819eb288008fd2080959d7dbfd894ecef89d69f0e0d023e4e java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm 762991fd798dc9d95f9e2257ebde37ffd259e56d3bffb2c9c1a89fd16d523079 java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.aarch64.rpm 0380ccc8924cbf74181e32a3ec40e7e4acfe0ec967751b823a1e5950205ffbec RLBA-2022:7827 ansible-freeipa bug fix and enhancement update The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132974) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132988) * ipaconfig does not support SID and netbios attributes. (BZ#2132994) * [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135753) * [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135754) * [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135775) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132974) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132988) * ipaconfig does not support SID and netbios attributes. (BZ#2132994) * [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135753) * [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135754) * [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135775) rocky-linux-8-aarch64-appstream-rpms ansible-freeipa-1.8.3-2.el8_7.noarch.rpm edf7bea18aa5aa09f08e6254dbcd806bd8c5bf373ee5bbb8c5e4e1d38b566f1d ansible-freeipa-tests-1.8.3-2.el8_7.noarch.rpm e453a34f04150c6379ed44a447f7a03901619c170cc5e661936d6e3a39356c70 RLSA-2022:7830 Moderate: nodejs:14 security update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.aarch64.rpm 3285819533bc8afee17e385ba2e2268977507bc4645ee6d1e4baef594131405f nodejs-devel-14.20.1-2.module+el8.7.0+1071+4bdda2a8.aarch64.rpm a7a38bd42d81917e9645784c91c79e67fdbcde4f333f556a33de54029eac7783 nodejs-docs-14.20.1-2.module+el8.7.0+1071+4bdda2a8.noarch.rpm ae67e51aa0aa621dc10bbf046420486aaffcff02ec89b5aee959668cedbb14b0 nodejs-full-i18n-14.20.1-2.module+el8.7.0+1071+4bdda2a8.aarch64.rpm b7733c12668858cf4b221c6225d51add6903a1ac9488023bf7da4fcc344896bc nodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm 55f9bd5bdc650f0fd4fdb188530ca4a53bbf2a9511fc9fe7d67b70a26100d642 nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c npm-6.14.17-1.14.20.1.2.module+el8.7.0+1071+4bdda2a8.aarch64.rpm 26031a533fb2312083119f8393804971fe543bd548db0458538f3692b62aa598 RLBA-2022:7833 pacemaker bug fix and enhancement update The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Bug fix(es) and Enhancement(s): * Running crm_node from an OCF resource agent's metadata action will hang until the timeout is reached because metadata actions block the controller (BZ#2125588) * Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589) * Resource agents that call crm_mon in their monitor action, such as ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown (BZ#2133830) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pacemaker. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Bug fix(es) and Enhancement(s): * Running crm_node from an OCF resource agent's metadata action will hang until the timeout is reached because metadata actions block the controller (BZ#2125588) * Resources that are reordered in the CIB are not moved until the next natural transition (BZ#2125589) * Resource agents that call crm_mon in their monitor action, such as ocf:heartbeat:pgsql, may incorrectly return a failure at cluster shutdown (BZ#2133830) rocky-linux-8-aarch64-appstream-rpms pacemaker-cluster-libs-2.1.4-5.el8_7.2.aarch64.rpm 3c279c8129a0be5099d13558f461ab6d2c33572b67f9eff5426076cc03b9099b pacemaker-libs-2.1.4-5.el8_7.2.aarch64.rpm 0a0f6e001dec90bf61a55075b5828485091902ecc6cc44df746f2a9d987fdf77 pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpm a50616f73a2a2e456d3bba21b8b4892c73814cc429db6bd992bd6eecaf5c6d3f RLBA-2022:7835 mutter bug fix and enhancement update Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) rocky-linux-8-aarch64-appstream-rpms mutter-3.32.2-67.el8_7.aarch64.rpm f7a50fe9afc91f5eed07ed5490f6fd6e2c83831ee7b683c427ce593d87382362 RLBA-2022:7258 java-17-openjdk bug fix and enhancement update This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms java-17-openjdk-17.0.5.0.8-1.el8_7.aarch64.rpm b6e428611a8ef7629e99b5a9e99042a865f4e2ca9234567721e5648ea6a78334 java-17-openjdk-demo-17.0.5.0.8-1.el8_7.aarch64.rpm 2f07504bae1efc6617f23fb088af3f87693b3c8eed1f1cdc86b008868ea27bb4 java-17-openjdk-devel-17.0.5.0.8-1.el8_7.aarch64.rpm 883afa39f85693bc046975077dd2530e6cbc23e1fc36af21844c3268009704ab java-17-openjdk-headless-17.0.5.0.8-1.el8_7.aarch64.rpm 0a7afa6e753fcadeb210c0f0ec49e016aafee4065b6d61e6df97bfa0f43e373a java-17-openjdk-javadoc-17.0.5.0.8-1.el8_7.aarch64.rpm 733c38bf799d175eaa3c9cfe26876c31b37474605918cf5999432b07f969f789 java-17-openjdk-javadoc-zip-17.0.5.0.8-1.el8_7.aarch64.rpm 667a5231780a8b674f3f73c09aa92a478edd1b987f8bb83beaa7491ae593f93d java-17-openjdk-jmods-17.0.5.0.8-1.el8_7.aarch64.rpm c352d3dda0c5c9a05f7996506711c3595a2ea5e672b328b6a00a9818fae768f0 java-17-openjdk-src-17.0.5.0.8-1.el8_7.aarch64.rpm 8ccfab472f1cd5ef940dac4c537a888d00e64761b3cf083c732b646e5e748da7 java-17-openjdk-static-libs-17.0.5.0.8-1.el8_7.aarch64.rpm 1d24aff2c9c9fd88a037e7ae061eaef0f452e7e8d181e3e40db1b82a793b089d RLBA-2022:7438 java-11-openjdk bug fix and enhancement update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) rocky-linux-8-aarch64-appstream-rpms java-11-openjdk-11.0.17.0.8-1.el8_7.aarch64.rpm 0e9e671509eadb5c09f30d6de3169708ecf6c6912a4883219099bdf5c9448b85 java-11-openjdk-demo-11.0.17.0.8-1.el8_7.aarch64.rpm c0676dab67b0cd1c66383c0b47f7035e04462c2c66d88057933b689fef0b8eb1 java-11-openjdk-devel-11.0.17.0.8-1.el8_7.aarch64.rpm 930d8c81c994c5e24a7e0397fbfde80b08a4cebc299d9b89db1c3f17fdabf43b java-11-openjdk-headless-11.0.17.0.8-1.el8_7.aarch64.rpm 394899ab4f787c5b788d48c1ccb149f65b041e39741dc70165875a2e06542596 java-11-openjdk-javadoc-11.0.17.0.8-1.el8_7.aarch64.rpm 37a26a326f58a1e77f5355605078fd99b25db29a2e753ef5a950c685f903298b java-11-openjdk-javadoc-zip-11.0.17.0.8-1.el8_7.aarch64.rpm e969ac0c578341f4826c27a2f5d35a07583c649e4a3bc3e61d3dc9aafc35e67f java-11-openjdk-jmods-11.0.17.0.8-1.el8_7.aarch64.rpm 16ded799ab4276c2000e54591eef5f0d353ab3a8c5b92dfb42557ca68ee7dff9 java-11-openjdk-src-11.0.17.0.8-1.el8_7.aarch64.rpm 8651f1a4b706befd5cfe73afb987a482b2ee04ff251520c722ca056354f2d998 java-11-openjdk-static-libs-11.0.17.0.8-1.el8_7.aarch64.rpm cab9b3a75e95140382c2448e501727783dec5e488f5cd3ef36837d3d6df77681 RLBA-2022:7861 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-7.0-7.0.0-1.el8_7.aarch64.rpm 738943ac9da7d2581c4ee04cd4dd8f6c5f3e34e60639e62a53fb91dae10cce76 aspnetcore-targeting-pack-7.0-7.0.0-1.el8_7.aarch64.rpm 681ad54c80442523ceb09471b803802bd06c06697adc2506f7908021a71a1f33 dotnet-7.0.100-1.el8_7.aarch64.rpm 95840489fdee116f117fb4ee3646b289c374dfbd4a949f7224a75ece91f8feab dotnet-apphost-pack-7.0-7.0.0-1.el8_7.aarch64.rpm 50de321d18ad84e74ef05c30125165248655b903b1248b216b6f8be916dbbd8f dotnet-host-7.0.0-1.el8_7.aarch64.rpm dccd7b20545b77215ea004564d387cbf5aec88a160c4bc056bb68faa452a3782 dotnet-hostfxr-7.0-7.0.0-1.el8_7.aarch64.rpm e12899f2f083b89d7639e617bffbf0abd03cee29b84800b7308a001cf82127ed dotnet-runtime-7.0-7.0.0-1.el8_7.aarch64.rpm ca235ae7b98224fac4b0f5938ecfb9abcfe86e823b3f0a125f0409ee93ab6595 dotnet-sdk-7.0-7.0.100-1.el8_7.aarch64.rpm 62b27b1956e938220736bc73b20e5cc8b7cb6fdf6fb6e11be250410112584fe8 dotnet-targeting-pack-7.0-7.0.0-1.el8_7.aarch64.rpm cc2730fee25f4c4d9917f1c2797ed6e9bac574e1c9143199af465ef6d0763081 dotnet-templates-7.0-7.0.100-1.el8_7.aarch64.rpm 53185b566524f3a89a24da42953735be13007aa1302cd1bc2fc053f27d36d009 netstandard-targeting-pack-2.1-7.0.100-1.el8_7.aarch64.rpm b826fd99dff7ae3ac7b76d1a08f5798f6b48d229be0369ac37726f452cd7a5d4 RLSA-2022:8492 Important: python39:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-psycopg2, python-PyMySQL, python-lxml, python3x-six, python-toml, python-urllib3, PyYAML, python-requests, mod_wsgi, python3x-pip, python-chardet, python-psutil, python-ply, python-wheel, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, python-cryptography, scipy, python-idna, numpy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__python39 python39-3.9.13-2.module+el8.7.0+1092+55aa9635.aarch64.rpm e1e9cd9f2680b65678e6721221637337f206115cdfa8cae88bb32dd51af7cdf6 python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.aarch64.rpm 945155b2014169d41094e7435f5f87d32f1051e106387ca6cc8e793f5f4724cc python39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.aarch64.rpm a1d3823b13a2340272701cc377c599dc99c444cfbc72ddaa59e8bb49a0be753a python39-devel-3.9.13-2.module+el8.7.0+1092+55aa9635.aarch64.rpm cc247350a163b59d9ef02d062692e28f1311a504e74638286d385775ffda96fd python39-idle-3.9.13-2.module+el8.7.0+1092+55aa9635.aarch64.rpm 107365b5e48d598fa13690e4d5227287b7a8a1ae5e5ce486adfb04fbc0e8ad74 python39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm 5ed2948974fffb3f8f09ee67cb4a422ed8503603bdc98172933d5c6786557ee4 python39-libs-3.9.13-2.module+el8.7.0+1092+55aa9635.aarch64.rpm 70a9d2c4c32b310c3323d77cd080daefa0334a7e0a79c8e8c26bd3f8e2fa4116 python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.aarch64.rpm 6c6625c6c95d89323390378eaf5350c35b9343b064ffee3bd6d6d5aab9bfe755 python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.aarch64.rpm cec12f1c3cd2827c2cec3ae6efc19dff3d82c056ddafdc0d11ff94928d32a91c python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 0da717455ca0e38a885aa00a9f1ab095e43ad699c0999106516d7c0ee860f51a python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm c4eddae3797896c431af2160ed9084fe2673bb6bc39acfc9f733d502cc5bd3b4 python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.aarch64.rpm 1359c2457bcf3296afabfa4a3faf9c5852588cb881aca27112612f258f3c5119 python39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm 5204c287450cf1579ca958d4b8e807cb70b5b7f55903604f6e8c64b9da8df019 python39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm eb25c5ade496b7c9d8ac56a635c29813f9e7b57f108e146e4be32678bea3874d python39-psutil-5.8.0-4.module+el8.5.0+673+10283621.aarch64.rpm ba724bda5f89379dc12d94c50dd02ef0cc45d4a2657a311469101a57adbc9866 python39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm dc96fad532dd6778a43cab79eca2e80d99d5c3daffd69ea743282f8f1a956422 python39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 518551ecb5bf3e32fbcf7dcc25feba54c738e86f77d84c1e50ff74e7f5f0f0b6 python39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.aarch64.rpm 9dc218c0e4d7aa1754732b02593a0f0f727902dba3a3f0d93f95538c5c511ece python39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpm 4d9868324494e41e1e3c7f4bc44dfc267f2140bbccaba4579cf4f51c0db26748 python39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpm 1ce772a9f4903c0aa9c776c8f85d48ff79bb3fc4e6fa5d38a671f8c55915becf python39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.aarch64.rpm c107d9e7b25869b140877301ac6abefa2d4b9bac14a623975ca7aad2eaf7697f python39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm 12d4e4e5cad76a2589c6b14e19ddd72e350c26aea4ca8382903c692eabf6eb5c python39-rpm-macros-3.9.13-2.module+el8.7.0+1092+55aa9635.noarch.rpm be6912750857e863edf1eab1ae17f464094587f3f9a23a6e032f92ce32cd574e python39-scipy-1.5.4-3.module+el8.5.0+673+10283621.aarch64.rpm b5b8a4573507189006d61b606f716c102e75ad51f13c9a830467cb6bd3f56151 python39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm 2c935815f3981878907f59325da5c5364d4d450aaf395bf64828c63c9618ba55 python39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpm fc4c675eaf90545edec065c8d5b2d89072912a2f5f1c115b9069ba18d588fc7e python39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm a5fa248a2fd5d325e47fdfda3e131ee1f1289942e23cfcbd74e93d3b1b514cc9 python39-test-3.9.13-2.module+el8.7.0+1092+55aa9635.aarch64.rpm 08c877917c1dbd9f43e196e75b17d025c0dee35f4a31ec1cc3c578399cc75cd4 python39-tkinter-3.9.13-2.module+el8.7.0+1092+55aa9635.aarch64.rpm 02d06121722bd61ad74a8fd67dd55dcb908d949a1684c715db0ffe18efb15179 python39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpm e3ee269c76b77939589fe444d3cad8c329c7d5ca64e922131265299983543c94 python39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpm 58389f84b3ffeaf5df3f63d032fd3b7727a351d7a0edfa0b49b9f82957fd52aa python39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm b033a1e45eececcf54ba520f36812695312b166f72ee448b558f5a4efd600190 python39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm c7a1d8dc55704e74a92ce63c7d31dddd31c11662555077c608fc905182f13fe0 RLSA-2022:8547 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms thunderbird-102.5.0-2.el8_7.aarch64.rpm b3f19c0e5073820b2b840363b844998dad791670b11b48ab8311a9f377ecf5c0 RLSA-2022:8554 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms firefox-102.5.0-1.el8_7.aarch64.rpm 50320865976269d489cf6165d0b0127ccab4baf5dd05efb401fde3848d90b35f RLSA-2022:8649 Important: varnish:6 security update Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for varnish, varnish-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__varnish varnish-6.0.8-2.module+el8.7.0+1094+66cdd070.1.aarch64.rpm c5e04f48e9f5846d2e17c42ffe6228c45ba4aca1836cb8ce7de19972af8c58dc varnish-devel-6.0.8-2.module+el8.7.0+1094+66cdd070.1.aarch64.rpm 5fd57c22eb1e91894413623fa9e457f58e97d229bfdcad9dae4cd843bd56e075 varnish-docs-6.0.8-2.module+el8.7.0+1094+66cdd070.1.aarch64.rpm e4a56dea2d4b1eeaede733dfcb276853e779be9e6a24c4fec20d2045cbc6cc96 varnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.aarch64.rpm 784052816572e4acf6cd5d8f9b62108e132759f87262fad26d6372f681cee205 RLSA-2022:8833 Moderate: nodejs:18 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818) Security Fix(es): * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818) Security Fix(es): * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-18.12.1-2.module+el8.7.0+1104+549f92a6.aarch64.rpm 38b4babf2e95fd824c31fe162029487a131e5e12b96902316f7ecae9a0314867 nodejs-devel-18.12.1-2.module+el8.7.0+1104+549f92a6.aarch64.rpm 07bbf3c925316bb7c64265bf126db33e6fccf268f8d5f9d6422de55088dfdcc5 nodejs-docs-18.12.1-2.module+el8.7.0+1104+549f92a6.noarch.rpm 37ef414b21908c52aed4b6783d8d2102585a0fffe339215361f941dab617afe8 nodejs-full-i18n-18.12.1-2.module+el8.7.0+1104+549f92a6.aarch64.rpm 52843172f84cc8850501fc2cfa487e4a37bd50457f3e3768632ffdfa35b34b72 nodejs-nodemon-2.0.20-1.module+el8.7.0+1104+549f92a6.noarch.rpm b0c10787f8ad3c63d98c7a029cd3d668008b7b4fbdc912dead848fe65263fc28 nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm ffece635c6d640eed8fb89b76b64e4b03874e8ae7d4a1e6fba7438ba7f1c231a nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm 0505c56e61229be002ba0b15b188bd7a31d7c3187ebadfe7e6348cf9c3f463a2 npm-8.19.2-1.18.12.1.2.module+el8.7.0+1104+549f92a6.aarch64.rpm 3b67bbba132f210ef28333e1ebbb631c29bd4f2ef50fa0c3b3c8c779568cc00b RLBA-2022:9019 .NET 6.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-6.0-6.0.12-1.el8_7.aarch64.rpm 27d55ce9360159a5ab61752c30d6a7d086a7d7384448329d97b6303f3ae6555b aspnetcore-targeting-pack-6.0-6.0.12-1.el8_7.aarch64.rpm 80f3c8f372b0f7669a55f5be74e8701c23be9ae1aefdf6372fd562f1ed6fef6e dotnet-apphost-pack-6.0-6.0.12-1.el8_7.aarch64.rpm e709558ccd3c45d66af6d8cc4d938226e34f00430c309d92cb456bb8d3a3efac dotnet-hostfxr-6.0-6.0.12-1.el8_7.aarch64.rpm f151baa3ae4fabe4fdd3f3634debb174630127c3893ab30d4abb9c59a8a0b734 dotnet-runtime-6.0-6.0.12-1.el8_7.aarch64.rpm 49360209b92c304a978dd2ec1a17a7d68755a4330d76a1dda04220a6901535f4 dotnet-sdk-6.0-6.0.112-1.el8_7.aarch64.rpm e5950ea2dce691a4cccc6603c5881f3b997d6055ac6ae2edc412f90898629f30 dotnet-targeting-pack-6.0-6.0.12-1.el8_7.aarch64.rpm b627df9ba5a27079fb47d7ee9981ed86800006473087f5f80195b284edf67193 dotnet-templates-6.0-6.0.112-1.el8_7.aarch64.rpm dc1b520503007365db9b5a1ff2fb988c09fb34df2904cb534c68bbb23eeef47f RLBA-2022:9020 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-7.0-7.0.1-1.el8_7.aarch64.rpm 361635290f59651300f2f77f0a89219cdc59756bbe83b739afd158e32e065b45 aspnetcore-targeting-pack-7.0-7.0.1-1.el8_7.aarch64.rpm 27a0ca736b27b7d8e345807bd16bff1d51acbdc860e558c847fb20919cefedba dotnet-7.0.101-1.el8_7.aarch64.rpm 7fc14c38bad6748dbe6cc37a70f59d78e6ef091feb0c555e52529c44a892a89b dotnet-apphost-pack-7.0-7.0.1-1.el8_7.aarch64.rpm e0471e8071d768c9a84c489dcd9868680808b3baf735b17245b9141ea07d6985 dotnet-host-7.0.1-1.el8_7.aarch64.rpm 809f86797329e776b4570a75702d25adb9bc8aa8fec86d4672677ca6938b9934 dotnet-hostfxr-7.0-7.0.1-1.el8_7.aarch64.rpm 4f8748893c8b14d5fe49f0a16ff16fc5dba403cb5260de753a6bd8d889959ffd dotnet-runtime-7.0-7.0.1-1.el8_7.aarch64.rpm 88806e3e030536f565f97bbbe9e1d42f4e5e83c0ed153559e0705b8a240cf031 dotnet-sdk-7.0-7.0.101-1.el8_7.aarch64.rpm e625c470150737c3c6d3cff414a0f89d5cd9bea2daaf449aac80335bfb733f2f dotnet-targeting-pack-7.0-7.0.1-1.el8_7.aarch64.rpm b6d2a79a422211ef4a08fde366af91c497ead5132f4224ed9e2d4b3ba1f7e1f9 dotnet-templates-7.0-7.0.101-1.el8_7.aarch64.rpm a8533d45a03b4a1447361ffea1ed719ba0511d66a2fabe9f3106289294c1a1fb netstandard-targeting-pack-2.1-7.0.101-1.el8_7.aarch64.rpm 0d34a2bd5993005e20481bfc612e3758fdbb7348ac37c6322d7d4b20d29d7866 RLSA-2022:9058 Important: prometheus-jmx-exporter security update Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for prometheus-jmx-exporter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms prometheus-jmx-exporter-0.12.0-9.el8_7.noarch.rpm 7f0ee106105d94ea781c5708ae94636470835a481955f86d8287decc606eeeed prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7.noarch.rpm d55d78db5fa0b4a9613c03980a7acc56d80f9da749c0038b6a035945813827f8 prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7.noarch.rpm 744f60f7d304e56fcc61d9350522f83e20f744c834e2c3d04bc5f9c20133bbfa prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7.noarch.rpm 3de1b62ba2631039862963f1827e5faf5422b5c65aa0afd8c07337e3cba96ffc RLSA-2022:9073 Moderate: nodejs:16 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531) * nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532) * nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533) * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) * nodejs: Prototype pollution via console.table properties (CVE-2022-21824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-8] (BZ#2151625) rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-16.18.1-3.module+el8.7.0+1108+49363b0d.aarch64.rpm d3893588fc406eda74848434fea87d3b7b054fcc98b0742197d5767f6b8b99f8 nodejs-devel-16.18.1-3.module+el8.7.0+1108+49363b0d.aarch64.rpm 9415135eac911c3a6f373006e2dc8ca40c73d0c55bbb0d9eb326090523f46877 nodejs-docs-16.18.1-3.module+el8.7.0+1108+49363b0d.noarch.rpm e4cad5a20aadf5c90d0fd2bdbb03f5e769a587f3760049b0bcfeb4ccd84a491f nodejs-full-i18n-16.18.1-3.module+el8.7.0+1108+49363b0d.aarch64.rpm 3d746decc45a641da907a022ceecbbe6c9f422bd926c07006b5e6c9d4bad939a nodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm 7cfdc2a79280af0253fe192f0b797d38da309b280564776c073ff1d43ed0eee1 nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm b182f1de4e05b48fef944e195b8c6ec385984300c39aa9d70afeec3f6d39cb75 npm-8.19.2-1.16.18.1.3.module+el8.7.0+1108+49363b0d.aarch64.rpm 853539c7c0acc05768fbe555837a332f3d5d6acfd21ef0d523e9f2d488e5c509 RLSA-2023:0016 Important: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms webkit2gtk3-2.36.7-1.el8_7.1.aarch64.rpm 74cccb83ae901f4920d30b0edb3c96d607e73dfd3d53f8f3b091d36f7f45098c webkit2gtk3-devel-2.36.7-1.el8_7.1.aarch64.rpm 7f9b7622190e369cecb372097474d8871f3bc0d9deeec795c5f955a8864ecd2d webkit2gtk3-jsc-2.36.7-1.el8_7.1.aarch64.rpm ffb60a91a07fa79bfe4dde55163d09b8381e3f5d43735dcc515accdaf3fbac65 webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.aarch64.rpm a4a7349900c5ceaf72c2762d939ca009ced75171b472cb47e74b403d8de9143e RLSA-2023:0050 Moderate: nodejs:14 security, bug fix, and enhancement update Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__nodejs nodejs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.aarch64.rpm b5bb6bb08dc7d640aa25126619131b789ffd94e2e8fc66f2c75640cbd3526ea2 nodejs-devel-14.21.1-2.module+el8.7.0+1116+bd2a84b4.aarch64.rpm fac81a9f31334665c4f138987496f7a06a2b1ef3e20c519c9d47bfb4903aa065 nodejs-docs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.noarch.rpm d3c7996c0f56313a8aa1a7de5476ea69d6f54a8ec33eba74fb619a49a009de35 nodejs-full-i18n-14.21.1-2.module+el8.7.0+1116+bd2a84b4.aarch64.rpm c6e9e5c8269ea8091e01e67a7169287f7eeabcf3380d33222308bf9e3e8af908 nodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm 7cfdc2a79280af0253fe192f0b797d38da309b280564776c073ff1d43ed0eee1 nodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm 957355d4dc89af553da3e68c6a666d73dab35d2f83cde678b3104770105d2f8c npm-6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4.aarch64.rpm da9bdfcff4d4897d530540d098633903229c70bdf0d2674b7a3b315a82298dde RLSA-2023:0079 Moderate: .NET 6.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-6.0-6.0.13-1.el8_7.aarch64.rpm 652a9b175e46176ea22575d8143ffba5a5c694968a8242b8de11552e2b5cacd5 aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7.aarch64.rpm 2d84e09a044faf861472bf4efcd3c226f836143420574e974bce547d551c8376 dotnet-apphost-pack-6.0-6.0.13-1.el8_7.aarch64.rpm a364b6b99ccde046dc530c3d860e4bc59d96cfe8cc9e2bd954db8b3a18e72185 dotnet-hostfxr-6.0-6.0.13-1.el8_7.aarch64.rpm 12a363b9e61544db7a184fa7d81f0ae624f852e43f2cf4e62c5d7f1729ae2ec2 dotnet-runtime-6.0-6.0.13-1.el8_7.aarch64.rpm 8537f95766da181966dbcdfef1dd903f970132ce33e904926d91d06ad529e4fa dotnet-sdk-6.0-6.0.113-1.el8_7.aarch64.rpm 49a66a71fd8a83cb88f02039d77c97d8d8fe89c196cb8149c29d16e406c05c36 dotnet-targeting-pack-6.0-6.0.13-1.el8_7.aarch64.rpm 9efb7a586b4f21b1c4278fe840791f5817286ba259fd13dc9ffdb76e415eba54 dotnet-templates-6.0-6.0.113-1.el8_7.aarch64.rpm 1bc6acdaf2a265bcddded06af067355b20805cdc4846cdcbb381124f69ff340c RLBA-2023:0081 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) rocky-linux-8-aarch64-appstream-rpms dotnet-7.0.102-1.el8_7.aarch64.rpm 7e34c394eb3407d57b4d0f1c79a34fdf85da41a3bf9d161aee12cabd3128f479 aspnetcore-runtime-7.0-7.0.2-1.el8_7.aarch64.rpm 1531e5d1c16c046aa5fb502c22c5fd500d0df41a5bf08ae48dc200f8be0349ac aspnetcore-targeting-pack-7.0-7.0.2-1.el8_7.aarch64.rpm 686f654571cd112a0ff4848bb8f55e60a8139348f5e2f4c369d164896ba6ab5a dotnet-apphost-pack-7.0-7.0.2-1.el8_7.aarch64.rpm 50321f98664de4767d2ffdc98e2b46f0d6af4fcbc712ef7f308deb412a857595 dotnet-host-7.0.2-1.el8_7.aarch64.rpm 7010feb7c6dae171f4a1ad026d2c9a286d63faaee5d0e1fe3281e4bceaca049d dotnet-hostfxr-7.0-7.0.2-1.el8_7.aarch64.rpm 4f0ef6bb34ecbaae751d23a5141ed41f9fced2477b2986ff2bb5debaba5d59b5 dotnet-runtime-7.0-7.0.2-1.el8_7.aarch64.rpm 28cece3b81b937f580f12f5f2a14c837ed58e057b96df00014078394fdae47bb dotnet-sdk-7.0-7.0.102-1.el8_7.aarch64.rpm 8a10dfebc1c94da97bf385b2a65e67df75549481e9980d6e096bf7eff24d510a dotnet-targeting-pack-7.0-7.0.2-1.el8_7.aarch64.rpm 4a9b1bbbbb02d08f59a7218dbe893cbf1cf33ce2722a089b4b59a3500ad6cf33 dotnet-templates-7.0-7.0.102-1.el8_7.aarch64.rpm 31b176acfe31f4916e01e564896b1a5de178b1aa9b8d196435a47a18bdb27f9e netstandard-targeting-pack-2.1-7.0.102-1.el8_7.aarch64.rpm 40f675a3e3531211afc68f1cd6765ee23d336adb9f9755cf7ea7ae5f1c77654d RLBA-2023:0084 stalld bug fix and enhancement update The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126494) * Rebase stalld to latest upstream version (BZ#2136559) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Stalld is running in unconfined_service_t type (BZ#2126494) * Rebase stalld to latest upstream version (BZ#2136559) rocky-linux-8-aarch64-appstream-rpms stalld-1.17.1-1.el8_7.aarch64.rpm c06bf909bb1aa503bc3dbd24a533af55c0ff5b72f3c61665eb80a1eef12661d1 RLSA-2023:0087 Moderate: usbguard security update The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for usbguard. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms usbguard-1.0.0-8.el8_7.2.aarch64.rpm e9e97be913c2d2f2007b2d2bcb5b1751876fccf345095cbf3a1c0c40f97a6c12 usbguard-dbus-1.0.0-8.el8_7.2.aarch64.rpm 94aa6e2b7e2891d92c772ea94fa4708f1c8e27355d8ef857412ba0f1e62d294f usbguard-notifier-1.0.0-8.el8_7.2.aarch64.rpm 9f99c3299e7d54c8b6053395b0f296727a36aef50830e282311080e89a6f718f usbguard-selinux-1.0.0-8.el8_7.2.noarch.rpm 41b4556682f318713d2a783e5c2c86715f238c6048f5bca6f74726471a5b70fb usbguard-tools-1.0.0-8.el8_7.2.aarch64.rpm 53d8fe5d3ebed972e65ac746d5315e052245f4e18f85a8e423c353b5ab1c6b2d RLSA-2023:0089 Moderate: libreoffice security update LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms autocorr-en-6.4.7.2-12.el8_7.noarch.rpm 3226adb17ce830be21ef7a8cb76a6fa138ed07ac3ee3fc2fa6c7623382fc7cfb libreoffice-calc-6.4.7.2-12.el8_7.aarch64.rpm d94d9cc9cac2e7cf6b455331da80b5d667a5cf643fef9536e79fb23cbbbf1b8d libreoffice-core-6.4.7.2-12.el8_7.aarch64.rpm 320a8f6f6c546d5e1a2bdfd7a1080736c667bffaeaf5c383cc98405f50c61a27 libreoffice-data-6.4.7.2-12.el8_7.noarch.rpm 55fe5fa4565a7232047d81dc1d8d473643cdd9fce3c448fcdb2ba6d5a0b9669d libreoffice-graphicfilter-6.4.7.2-12.el8_7.aarch64.rpm 687145318c6f1a22acc8f68420c27b0b8c84d160e7559ad66819e9a1adada513 libreoffice-help-en-6.4.7.2-12.el8_7.aarch64.rpm 9dcc5384842b8ec161ec9473274e5fe7cf6521b2213094161c112fb7733865a4 libreoffice-impress-6.4.7.2-12.el8_7.aarch64.rpm 1f39446465328a935c9d672f12283f13d36783291bdf047df64cd27cd609cfa2 libreoffice-langpack-en-6.4.7.2-12.el8_7.aarch64.rpm 3c5407036093a0e153a393d90faa0d51cdd681360cc619a9cb7aea476b3aef21 libreoffice-ogltrans-6.4.7.2-12.el8_7.aarch64.rpm 772f12107d70ad097197e19e3e1318334a811b8c8de04024cd18ff16c1719a06 libreoffice-opensymbol-fonts-6.4.7.2-12.el8_7.noarch.rpm a23e251ac634daab48bc8affc4b2f86afebcb56cd8669ebccbc0138a8977023f libreoffice-pdfimport-6.4.7.2-12.el8_7.aarch64.rpm a441f265b9a61624ace00d94352c3b2d2636403d2689dd66ab083732d019f497 libreoffice-pyuno-6.4.7.2-12.el8_7.aarch64.rpm 70d746cfd7fb6687bb1bd5f422edc044a3e347cd938f86a4b9c7e76a45c7aeb2 libreoffice-ure-6.4.7.2-12.el8_7.aarch64.rpm f42754ee28a3dad60ab14d29cd56b3e4c1f69c6b1b90bbd4eefa98a54a2bbe96 libreoffice-ure-common-6.4.7.2-12.el8_7.noarch.rpm 2fbcb645e02e306e13308bedee3b63ee75c65750ae227d02a2fec1bb95120bb8 libreoffice-writer-6.4.7.2-12.el8_7.aarch64.rpm a3a2ae1d9541c982f7097255d7ed7bcd11b0cdc37b56062ff1df0476f715d74b RLBA-2023:0091 idm:client and idm:DL1 bug fix and enhancement update Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050) * vault interoperability with older Rocky Linux systems is broken (BZ#2148255) * rpm -v ipa-selinux produces warning (BZ#2150243) * ipa-client-install does not maintain server affinity during installation (BZ#2150246) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipa, python-jwcrypto, custodia, bind-dyndb-ldap, python-qrcode, softhsm, slapi-nis, python-yubico, python-kdcproxy, opendnssec, ipa-healthcheck, pyusb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap] (BZ#2133035) * Attempt to log in as "root" user with admin's password in Web UI does not properly fail (BZ#2133050) * vault interoperability with older Rocky Linux systems is broken (BZ#2148255) * rpm -v ipa-selinux produces warning (BZ#2150243) * ipa-client-install does not maintain server affinity during installation (BZ#2150246) rocky-linux-8-aarch64-appstream-rpms__idm bind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.aarch64.rpm 58f25fef08ad7b085a1646e5765f893bfcd26afea2fadfd5c1386a8ac5dffce9 custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 689414a092e09ef58bb886f5a04fd9bd9a633de6325c25a7e48a8f48b540f4ce ipa-client-4.9.10-9.module+el8.7.0+1119+c1de6b59.aarch64.rpm 2c973c1b8be860d7be36347581a2067f51de2cd35f5d3838e3fba0f55e7f7d2f ipa-client-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 87209f819bc410977be2fa83c5f0c9910664df40eb1aec1e65ba0e418d102d47 ipa-client-epn-4.9.10-9.module+el8.7.0+1119+c1de6b59.aarch64.rpm 3baf665c633f253363b0f0f57a18a0dd62e45311139677c571bc692af97397e4 ipa-client-samba-4.9.10-9.module+el8.7.0+1119+c1de6b59.aarch64.rpm d7fd7b08e9c4108d9247e358260e6276538674d6b32f60979ba5294b87f1e25f ipa-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm b496333e37ebefa19ca28f1b164a48520fc238fd40d1c7018ad7b47a6c456e72 ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm e273335ad4d42c167d380d2367e199f7b7df5b251a42c3fea602770a842f11d2 ipa-python-compat-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm d80c8881358e6d76f7ad4e1f4d76d8553951cd1c897b87baa0d5d2c3bc8e5875 ipa-selinux-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 56fe377a8c0e3f967d3c9e1d83ce2dded61834b1fd1775151b2e21cced39ee1f ipa-server-4.9.10-9.module+el8.7.0+1119+c1de6b59.aarch64.rpm 75f9aab20528177de8d97e6fca4f73e6e2324f4eb1e7fb2727a939db1de474e0 ipa-server-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 5191bd7ac871cd910d283a40e4fcfaf91798c1c57735e0e590e3e4eb175b4038 ipa-server-dns-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 9f41755796d71148e825ac0b799bb2f49d4ca25954bcfcce7246ea03fa8e8307 ipa-server-trust-ad-4.9.10-9.module+el8.7.0+1119+c1de6b59.aarch64.rpm 18af3f45f8a127cf6a85f4b66c4ae3afbbf6788924d342f2b40f9c31540a1101 opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.aarch64.rpm dee16cfb204efb6d12a5f719c7578dce139f48f334e7e969e2c3b5c8409d3d40 python3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm 24dcce8ae7c406c9195ee00935e871b49b862e859c5bb079302004cef44eddc3 python3-ipaclient-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm b580f064a347e161cb2311b81d764f0ed89c565ff596e28b749d3000e8c7569e python3-ipalib-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 7c780868b2fa76e2ae544cead2fb817bf49cc11de7411cfa31677e30ff8edd9d python3-ipaserver-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm 7849ebb2a2aba9c753b23802e8b6d0941bb899261761909ecd33df6e1549ee4e python3-ipatests-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm e970ca6b367982e7a0a22590564f05ca9f640fc2148d1afcca14f16055038d90 python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 614fd471d5b1912f23791f8b533172d92d1c6b27d504b4a900180f83d7e8c37f python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm c5f6dfd01f04862214fa2f092a4574889d903e9a081cae92ead60cc020557baf python3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm ee7487d31db5ef774a51a90213880f5c673ab6cd5f0d021bff287e0fd3c82535 python3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm 3d521c968357828cdea57245037a8e78f6ce244dc3ef65566461f92d74860cf0 python3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm 94698890dc8f5935b11ac8d3e2cd070ed0095cbff39670a6a09638b03045452a slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.aarch64.rpm ed646e8ed3419d164176a4a1397121337c4eae0fa9fde9ab95777df614661a50 softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 49d16e121200cf11641dcfc513fa5b54196d5edc58dbbb4691dc75b4bc92ec4d softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.aarch64.rpm 031514a04b556fe1255535f7f4b450d73f81436c73da7ed77a60d108b6f072ac RLBA-2023:0093 gnome-settings-daemon bug fix and enhancement update The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * Automatic logout function logs out of GDM session, causing GUI to fail (BZ#2122962) rocky-linux-8-aarch64-appstream-rpms gnome-settings-daemon-3.32.0-16.el8_6.1.aarch64.rpm 412d59e74df9a3b02f9d0d4dd6064efe40a461791a7770ba873734e98f58bb8f RLBA-2023:0092 fapolicyd bug fix and enhancement update The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es) and Enhancement(s). * statically linked app can execute untrusted app (BZ#2137251) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fapolicyd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es) and Enhancement(s). * statically linked app can execute untrusted app (BZ#2137251) rocky-linux-8-aarch64-appstream-rpms fapolicyd-selinux-1.1.3-8.el8_7.1.noarch.rpm abcda5f83019703a5b94424fc5d890f8738ff16df740b7dd445d2b9301485dfb fapolicyd-1.1.3-8.el8_7.1.aarch64.rpm 1e908c72a10088968d3418a96cbdd1f3506f67cce6dd45e3fce600a2bc98e652 RLSA-2023:0095 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libtiff-4.0.9-26.el8_7.aarch64.rpm 00ee46a3f9ba36424c40b30ace02efade007fd0c18bf8471f1cef32f06664014 libtiff-devel-4.0.9-26.el8_7.aarch64.rpm ea5c0df8b55e905586f39d8ba94cb8fa0195248df40a42864dfb7ab71527e254 RLSA-2023:0099 Moderate: virt:rhel and virt-devel:rhel security and bug fix update Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176) * VMs hung on vnc_clipboard_send (BZ#2148504) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libguestfs, libnbd, libtpms, libguestfs-winsupport, nbdkit, supermin, libiscsi, hivex, libvirt, netcf, perl-Sys-Virt, seabios, qemu-kvm, swtpm, virt-v2v, sgabios, libvirt-dbus, libvirt-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:Rocky Linux module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176) * VMs hung on vnc_clipboard_send (BZ#2148504) rocky-linux-8-aarch64-appstream-rpms__virt hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 54ac9d5ff7cfe04c8c978174304f3b769c6ebaffb5b4867452aaedb5bb405fe5 hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 991c3ced4f9f62071fd55347b204cb02700ae6a92105be95b5cd7f8461084189 libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 09388c2d5713d49f885e6b3392307fd58da74d7b6fa6f7ce849e9f18b1b49859 libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm b79f399f3d02e0dfce20a6aaab6b2ff35cb2bfa703c849e327f551bb88d34842 libguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 4456694874c9d7346f28a9f1afa1a3456df30b16304fe183ff42190cd9e708c6 libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm f18c730bdd58dfed86528796516c3542ff9986404d707eb43f85638ef46fc576 libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm a7eea07ba1cfed5100b2df5c7b692d238ba5dc8a818d9a567f5238c135182fe0 libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 90c229c3e85f9d9926413433f7fc1831d5197fe26e1c58bf17bc328da032beb3 libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 9d75b7a60326f8d407640254c611454c5c98617a33ebdbb92f309ee92661fb5c libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 3c9d51c249abda39f7eb4c3a9e7aec28fd90a7bbebcade157e9bae228e0c99fc libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm ef7a76cd0531268f356a633c8baa9ed9a65fb7ed0f73225c0850a04e7db7e9da libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 739bbf4afd1555b117b4f6de59671d04ec0667bcdbb22cc2db39ee868075e626 libguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 0c1afa84a2ce7357193c0eae89c65ce30a9e143e7ead6c774c16371f58da4ea4 libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm e6cafc935323470c7f0fa1156693ff1fb9816931387cebcfc33057f1f535fee8 libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm f45396ca362fd4fc35b9f14babd32cfaea1321a6417308a1292f44d1224898f2 libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm e7a5c7078adc8a316314da0574b495d50c85f0ebf512cd6b2fff6a9c0a5ca920 libguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm b15b0dc2907d618b176770530c099b0067f26237906aac20de5e96b28deccaf4 libguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm 5d5c05f7f8470a00208277eb34687306aab70af2ce1bd57ac78528e631505f59 libguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm fcf5e04da8b2e33d35b82ad8bcc66fe5a34f7a1539484d14f86f49c1d1161bf7 libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.aarch64.rpm 9496f010dd51c309e35489e4b2b4eef9ca205efe10f699e727ebbb87f3216495 libguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm fdf9b549dff4877676996cf0a5cdc17d751131383ac7e5ab0cf2b219f28b4f85 libiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm bd22ab73da1614b34e9579c71f5dc393e9e312f571fa3160f16d104346b7e214 libiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 76f4388ee6035a5c1679577f3d90a61097c3b73ac87fd84f419af2eb1314ee61 libiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.aarch64.rpm 21da7f31fc0de14f2f75091f66fa9814da8d60fc8e2fa4c8bc296fedc251dce6 libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 1d38a90c326e379f852440694d829d9df286e82f0aaaf7a20cf01a1dfd7253c2 libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm b2f53364d79f1ddfc0ba13d433ae7c0383ab89416de170314ad491fa5f746437 libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm bc267e62ab3f58f101086759be4c2e23d04e1ad223dc3e5f9c3e612413663d4f libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.aarch64.rpm 02d772236564532af47919abfdae6f5373aae34fe7cdbed742bc4fd95ed8e361 libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.aarch64.rpm 65bddcfe7c8336ec5686801ae92ca04f3366f8be416fd043311af9223477c910 libvirt-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 845324edbc7202e2a3bd52e87c89173524ebffa271b73502d17dbd6162699804 libvirt-client-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 0319735962eeb35ad9b559a8500644d0ebe547dc58fcf83ec88b51fa8bbdd456 libvirt-daemon-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 435b5226f2fd1772428d80df597acd977f1b0c03d96474ed1fb11e043f944bdf libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm de83d771646d616311e92f408e0788a16c04c933beaf4f89b3d4cd78b43e19eb libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 8740f3413fc6e034e3989d59fbf467e44624d0975df6e94536896e702e6493e5 libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm b3808e5dd74ce714d59e364cb721dc6488cd72919017b4010fe9746fab7046b4 libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 5aa961bec0c29d0df7bd257b0790555eb11ad21c19383556bbdac77902a31f3a libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm b3205aa1d8a870891cc086bdcf69e6f4a5c6d316cee878f0044eadc2401daaf6 libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 029a485170eb8b157bedb21b1442f7a7b1c8202ae63b805ecdda641dd8de9792 libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 3508fcc3be36619e7efb8bd41303556ada3547f583adc252309a12488900422d libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm c3d7039188925dd8e30911eb7b46b293515e13b454c55649223bef788c005b19 libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm ff1a870a146e23bf3cd9ca44dc365b4661328e0aca02d0f6dd7890f5b714bc2b libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 22c1c3d776e4d08c01e6470113ad8d92dc45ec2b50c07e4a32ff57024df4fd90 libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 21ec566f5ea621da247521a530cd73e73042a04faaf051e246de20601443d7ba libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm e2a2a706b68e2282d42759dfab38745376979341c3ef2b43f80da4b91cda2006 libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 7940a99b91c9919b11df2a86b520be3513636f31ba50257add5fc83afadb6b21 libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm b80b912d3a1e683a3068476cf341972ff2bbe28512a719611f8f4acc445c82c3 libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm d1cf580c7ff79626b0fd517936d4be0211d8d821fd20522d0c892cfd3cb798a1 libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 2692707094b1110d010ec6115a46f230c2a11d9ab3b2de4aaa6696b7d03a55e3 libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 32c3f690eb7559fd5a4d3bcb2a838425d54cb9040982be1db31b9bd0bdbc3e5e libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 479b5789b27892c85b41a38608c0916bf6fbe032e066aa99a18308844bb5564b libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm c50e15edf0d117c539469877bea2de45a5611813d16913146cf4ee9256f851b7 libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 607ef73cac5ae958253194c39394fe5c1fc8c0710aa72dccbbfb5c29ed9d632e libvirt-devel-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 3b67357e4524c589cf7ae1c0d5c4aff08c982bc2c9276fb578a7d21c4cc5f8e1 libvirt-docs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 6a45d324f776c721da18d633f3b13eab51d1571e26b72a1f762c72024d07c891 libvirt-libs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm b8afa3a7775cadfb784475e4e4e82ff0453ea55ea8ab49aa2ea5eaf27e9d64ad libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm 92af3abb3bb71da46a7a6f59f1d393368d64e67a7b0b5affde80db26ee104d4a libvirt-nss-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm fb2de94f1f309ca120de666c4f03018ce7f6df17aa607a033102f0d5ff7026ac libvirt-wireshark-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.aarch64.rpm b93b85dabb9f53dafbbe9fb86b72bc23e5b47ec27458231cfd83cc4719bd0a28 lua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 440b4fd843f1600ab2a3a8620e8999414c5dbd7ff0a5315ce30cbe52a76eca13 nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm aa5c62e3fbf5ea23307d97e22527f643ceeb7a23ec6cffb8db277971bb87c570 nbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 857f74550b7100f3bbcb5838ebc3cb625b83804004286b1f4fd7c1b906d64b6f nbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpm eafcd58c95e838c54c5ff2e91932b8ce1c5fc7d4b7acce0ffebe81915f4d0cf7 nbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 7896e82315caee8ad9bd2644e530296ee622c2ddfae688248185723907e137a2 nbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 6f525884975cabd1580c6a8d697ccd8c045c659534a0c34c03968e9a21412908 nbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 8191bb3746b674453d36661d391b8c0e10a95f88c217921f9432d6b8a8bb6843 nbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm f52b83ae63637c8b1e7315dfa0fe510aa51b78cc05ccd97b300434e0a28b0ea2 nbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 1e49c7614560043aa959388f4518b2768e5425b8f9739ad1140006e3d655db8a nbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 0aed2f62163a1ec150571397fd8d769bb51779ad3ef7fd52607a9757f0fd888d nbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 766fceeadde01aee98d85e19c6277e616e069ace8b4c11779fdc56c79467bc2c nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 5b25ecac75ab91b2d379ded7bdbe88a94684e18f6061e7cfaed0ffb2946c6096 nbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm ce3e3ee3844c0029598e80ba43fbe8f50c0cc992aec0e13d8c6637f171372f53 nbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d576ab4e2f4ffc7807d2cb0f6e2e25e87c236f476b1a78fa91a9e17f037da641 nbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 452bfe16a3fa75235912bfa04b4f11556baee490f77e6321de7e153ac97a5fe8 nbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 94287915575db12bf71b263335af6131786ceb4b9b92e9c28fbbe8527c6946e6 nbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm d16e4ac2b791ac7c9e318c529447913de8ca95449e1202c8cf32fcbc3cb397a0 nbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 916e69a5b2bcc4d8b0112922078774ffa5dfaf7f9973df775e1f5ef51b21b382 nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 338678cc1b9159003aa7d2ea580f7d42e39a1e5ea2330a84878090fff1430425 nbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.aarch64.rpm 3c0620998763169c5353c90923dda89dc3de31163c58f37c31baa00b2af81c22 netcf-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 89346723a9714906d8170f8bbab00899806423554fe78155e18f6a4f307ce8f2 netcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 218bcfe263755a8b959c9c9d0400f73c1305c850f981cbfae8511e099f3209de netcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.aarch64.rpm 259be0b396e2a09ebf66242d928e5198c9bf82517a16305ae8ea4528fecb4de9 perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 39e68e387399720c563214f0b66f299572f479863300baf82e484bab46b46c9d perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 52a5808bde45ede583a0db96e7f97248c0580c696bf130e876599b9b23acc320 perl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.aarch64.rpm a142f30b346e5db77d4f5aa919920b3df24522a614c785efbc8a97df64ae5199 python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 3196143c842626a0a65c59ed1a7d1f7968fce62336a46d65ffaa996eaea74520 python3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 9a3bb24f836e37a82ae94971bc9a3a91703c6994c675e687c3b98890f14ab20a python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.aarch64.rpm 430e283968d39a981aac03c2c50e95f1adc9568bfed209ff0c948714a5a2710d python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 344571b98f62a01a4f3e496fb72b2aee5cc5d176ec1886b7084d1a7cc3e67436 qemu-guest-agent-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 00f5cb521b130e7fb07ff050b826af4d068ec5b8179b07d51a2c43f96924262f qemu-img-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 2f5c8645db36cc4c3a7731fb031d040c913934c83bcee3b4c0c566b9f9188ba7 qemu-kvm-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 5003cdadb03ffc1f523121aea07f137b8c90d133675e4408b89b2dc14b1bd430 qemu-kvm-block-curl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 5eef2988f10b5617b91e5dd33bbc71bb85420c9c2d713e17b760005a216d1681 qemu-kvm-block-iscsi-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 3971c0d247cdc2e93319c3140f2ada25df184ee4d4e1512324736249ea86929e qemu-kvm-block-rbd-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm a2eae14e0c036b8a2ce89caa92d8f5ce5068c9c8b693a2a8de4ad257ad33ff76 qemu-kvm-block-ssh-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 716f889da425445f085987151f1673cd159f974b759bd364f4a03e0863ed18f9 qemu-kvm-common-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 25794a2f41c1df684444e17c7fdfdbe0816a54162ced5c791eec488775fcaffb qemu-kvm-core-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 8c94fa26b528590f02182f9906010d4becd2abae825976afb2fbf09ba6ba10a1 qemu-kvm-docs-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.aarch64.rpm 8809476679e6b32303efb17f69759dd3bc6eca7fca1f21fe9eb1d662ab092aca ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.aarch64.rpm 9779f9da2de53bef16886c338550c88e75f3ae8884abcb437e45472ff604ab92 ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm 170624a8f7de11497719a2006c84a9a455db4935663c1ce6be6d4bd7dd6a7ae2 supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 5f0207b3793a77832c80929494fabaac45b48439c31e59270e7354efb7e16d73 supermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.aarch64.rpm 4ee91ae1900c19ea16f63ecb68516f8e57ab573d4ddfad831a61eb3797c3fe3d swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 55da933062600cfef45df3e4a68d652e0a73d8e1054ecc4ae8540e7ec2da8e63 swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 54bda5e86eac5c5196b4aaa5b58fcf2a664e5298d0653f3613e13ab8f93c0563 swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 46cc83ca8d215f72133283dc69c760e7a6d90d6f529dc1c4984eb138c4e6cedb swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm d49f7fed94d56270745f8a36eafcc91e9ff1d388518728e049285540e7332785 swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.aarch64.rpm 8e0ea3f78c79b3b7ee562fc46f2ea3a9a8a75cbab5520de2a44b87668866e466 virt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.aarch64.rpm f80dd339df16120425aa5b44a0a6bca5364a298e545b6cd4be988acf90d3517a RLBA-2023:0102 nmstate bug fix and enhancement update Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) rocky-linux-8-aarch64-appstream-rpms python3-libnmstate-1.3.3-4.el8_7.noarch.rpm 7086da0fa75e219045f9601ad661b7d75c84fac7527009e8be80d58d41b0ffab nmstate-1.3.3-4.el8_7.aarch64.rpm 6dd5d800d4b05741fd0854e62ad0db60ea389ade0f1161e6f3cb05287060199c nmstate-libs-1.3.3-4.el8_7.aarch64.rpm d8edb78e5ee33558282ba2add90f9d47e9e7da42415ec434b01ec1a681a65d03 nmstate-plugin-ovsdb-1.3.3-4.el8_7.noarch.rpm bed1142dcd60f7ef45d0a97b62b1bb15d781e1e6b42dc491ab045940156529fa RLSA-2023:0113 Moderate: postgresql:10 security update PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for postgresql. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Extension scripts replace objects not belonging to the extension. (CVE-2022-2625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms__postgresql postgresql-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 3648091d8fa796320b200012a24b77a612e0dc9eaaabc6a1a72d1cfcc10bc5a7 postgresql-contrib-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 16dce9f6a492c28ec8c786969e0f5dc23a2f0a1eaa185d4a0b8f28d8af1c1d66 postgresql-docs-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm a0e7995d08f429cadf17090e06e7b03446b89e91f943dabfb1c52d872c92a0f5 postgresql-plperl-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 13acffa7c6e487af4039a0587db0218d19828aea650eb4d7d32cb1399645d990 postgresql-plpython3-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 9ad3d281be2811ce0f7305b7d48899a8e97d1dd6e9788587c68be2d2b31feee9 postgresql-pltcl-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm a73e4613218c772161481e0dd33c9f3a1bf8362d88dae8eb120e54466132535d postgresql-server-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 468fe494be142881de41986ed1477b11a00e1fa20b5713fa91fe6f0b26e531dc postgresql-server-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm db8174ddd888eec6d64b0d3719c596544610b7c0eb487d764aecf4a53b826e4c postgresql-static-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 795c707bc895585fe4d2f99b7faae5fb4777dcebe95a8dfba02c52037a37742d postgresql-test-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm be38f42a9b0c9ce5b0b633cea18a7bdcc057b081141165dd3d983e95f1ed8e98 postgresql-test-rpm-macros-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 94a7b94c95478a59166771b3f3d8d8b7cd5e28215f7373297ec32b8729db385b postgresql-upgrade-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm c825518dae85ba55f018742d241ec0c6d226dc890e9a908e9fa0bdf71cd966fc postgresql-upgrade-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.aarch64.rpm 684d73652ace14f5bc401b3cbee4ceeb24503b45306914a25e13a0189d1d06f9 RLBA-2023:0115 container-tools:rhel8 bug fix and enhancement update The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294) * The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149775) * SIGSEGV: segmentation violation on s390x (BZ#2150416) * SIGSEGV: segmentation violation on s390x (BZ#2150428) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152017) * podman: ubi8 sticky bit removed from /tmp (BZ#2152027) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041) * podman gating test issues in Rocky Linux8.7 (BZ#2154403) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for runc, aardvark-dns, podman, oci-seccomp-bpf-hook, buildah, toolbox, slirp4netns, criu, cockpit-podman, fuse-overlayfs, container-selinux, conmon, libslirp, containernetworking-plugins, udica, containers-common, netavark, skopeo, crun, python-podman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Bug Fix(es) and Enhancement(s): * [FJ8.7 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2137294) * The udica version in Rocky Linux 8.7(0.2.6-3) is lower than Rocky Linux 8.6(0.2.6-4) (BZ#2143171) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149775) * SIGSEGV: segmentation violation on s390x (BZ#2150416) * SIGSEGV: segmentation violation on s390x (BZ#2150428) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152017) * podman: ubi8 sticky bit removed from /tmp (BZ#2152027) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152040) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152041) * podman gating test issues in Rocky Linux8.7 (BZ#2154403) rocky-linux-8-aarch64-appstream-rpms__container-tools aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 89302202bc3c8562e0e66e3e2dc7ceb2682a99e8af72912f9291a4480dd7d673 buildah-1.27.3-1.module+el8.7.0+1122+04a7498b.aarch64.rpm 386f0ca02dbef80fa4aea23fdc7a336cff1717213f26512be3fe30c7d6d576ec buildah-tests-1.27.3-1.module+el8.7.0+1122+04a7498b.aarch64.rpm c362e2c551da6b5d96780c4ec280ddf0cc91e4e88a9157e8dcc13bf43c7ed8ba cockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b6ec4da8b57643e010868c767fe370c537f59dae20ec5459864a53d026a8aed conmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 662cc47181d7447f4eaaea4b4dd6b83f13613356445e44cda5ba787fb8b9e3b3 containernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.aarch64.rpm e25d4aa99de7f0db48d671a34f066cb910e4569cd41c644125ec0de080b099ae containers-common-1-44.module+el8.7.0+1122+04a7498b.aarch64.rpm aa71cbe49eaa38bfa82e0751bdac4e6a2f94f7942e0ec09831ef35ee734182d4 container-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm 6e26e5ba57145a350835ee75fa8b6f019557904f6b2ba3469df718a3401a322e crit-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 08660d44bca45055d9d38ab9114494183d9ebd0397442d499b87f9a3370aedd3 criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm a39f063881869b3b2fa549cc062d9a6ce5c0af4bb5e399e39783ea3af8b4dca9 criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 24b79c11a558cfd261e876bd8dc34523cd66dd1c81aff91bd5eed3d584dd9209 criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 6b26166145aa6f037dc93da5346e7ddfbe7a75cd10ab67488e5970decafa4c05 crun-1.5-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 77149ef788493e72d83884f08861eb37fb381af478f8e209bd5b36c3dc9b1fa8 fuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 22b098f5278453b8bc2f7e9abcaeb06996ac1fdf8881e73a971721abdb8373e5 libslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 9e2dfec8d2890f572e738bd48e382991e6b823cce85f018ff9720de5afc3256d libslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 4764c45dec2a62eeeab17662718459f60ffc6e5dfed3b4e7f4645d10ffe62821 netavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 1fd37ac99e41c66c08b163ca39c78f32c6ac9cb79f862bd555ee7b77a0fc54a3 oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 26cfb89e3c1d1e6b25a7f7e40bda6c34c42a141b2ceab4b2d16de8c8a6cddf4d podman-4.2.0-6.module+el8.7.0+1122+04a7498b.aarch64.rpm 4588c0497d8457ff9a188deacae18431de144732922180bc983a18189a21064b podman-catatonit-4.2.0-6.module+el8.7.0+1122+04a7498b.aarch64.rpm 5897586a83ecf31c9a9b3d690406ba746f670496aceb089ded5ff024ca237649 podman-docker-4.2.0-6.module+el8.7.0+1122+04a7498b.noarch.rpm a62b5178722e0eafc533c22556109a27b4112c027f6c36c519ca214d068b30f8 podman-gvproxy-4.2.0-6.module+el8.7.0+1122+04a7498b.aarch64.rpm e9cdd004b4939bee648d4440ac76be60a9c39241ba88500b6fe0714e90362d6a podman-plugins-4.2.0-6.module+el8.7.0+1122+04a7498b.aarch64.rpm ba4a062ac284eab67ec11ca943dac9bb2f92860bbd65924ddb9e8c3ec7050438 podman-remote-4.2.0-6.module+el8.7.0+1122+04a7498b.aarch64.rpm 7ffc1d26a4d26feeda4d47b59a7ed30c660df35fd85821819ff3f47b705ea5ed podman-tests-4.2.0-6.module+el8.7.0+1122+04a7498b.aarch64.rpm dc3c6e6363ea1f9a1199e7d9a2de8b263a01eedc06b6d56d36c45c0beadf452e python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 7729c004d66c55f7c0e344cb83163221a786f4a6b526c1f041aa44813472d3dd python3-podman-4.2.1-1.module+el8.7.0+1078+e72fcd4f.noarch.rpm 2b696d0f504dd20e219ec48da145b4324efcc4ee393ebd32de98cd14f7aba3d9 runc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.aarch64.rpm 78f1b16f78b9fc7adff79987cdb193a2e5c35dec457c8260a6d52fa9f0c3da69 skopeo-1.9.3-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 9265cbcb6f7d1680c0e26a28e2f260156b91cf784599e6dd6a0884b3970fef61 skopeo-tests-1.9.3-1.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 2c55b66567c2ef5a45d89cb6d1ddb9e8c8f08fc224ec83f4f9f65c3d6089b74a slirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 30313d29e17592d71da2f4779933f1dbf9b2adb048ae6b8d3053d93e069552f1 toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 73cd6a5207f2527d63739b30acae92e0f1fe13a6889a7a677bb30891089c3e32 toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.aarch64.rpm 918efe0ebc91b2be593ebd21bd4ab208d02fe9383aebe20f3dd02c5ba61cc1ef udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm 0f158149711cfbc1599ff9fffbbed092ee7648d82419b542a6544c92d99b469b RLBA-2023:0117 virt-who bug fix and enhancement update The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124812) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-who. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2124812) rocky-linux-8-aarch64-appstream-rpms virt-who-1.30.12-3.el8_7.noarch.rpm 6742c5b921bd198cb398e575a267d856ce18f5d8a20669a08474a676542ba175 RLBA-2023:0118 gcc-toolset-12-gcc bug fix update GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131) For more information about usage, see Using GCC Toolset linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150131) For more information about usage, see Using GCC Toolset linked from the References section. rocky-linux-8-aarch64-appstream-rpms gcc-toolset-12-gcc-gfortran-12.1.1-3.4.el8_7.aarch64.rpm 89bd2734acf8c8a397e728096f23f806b5b2e5e4e8cc56d5119e84a7ef794a0b gcc-toolset-12-libstdc++-devel-12.1.1-3.4.el8_7.aarch64.rpm bceee1eebdc915e0ec29897997adeafbccb2f224930722ea3e9ab18a813b71e9 gcc-toolset-12-gcc-12.1.1-3.4.el8_7.aarch64.rpm 0aba8c610a6ed76cae89a79f37a37682672e107c0240460121664b5a2b418a90 gcc-toolset-12-gcc-c++-12.1.1-3.4.el8_7.aarch64.rpm cdfb5e947f82ccda9ee48bc41a936f53c9724f7139cb0add76d97db60204189f gcc-toolset-12-gcc-plugin-devel-12.1.1-3.4.el8_7.aarch64.rpm 9078831917f9c09037a13b90de5c7dcef811dd2cb54b60faa2f94c4599ad0591 gcc-toolset-12-libasan-devel-12.1.1-3.4.el8_7.aarch64.rpm 65daf38a1102e6c61366f134432725dd7389722c337c7818e8ee158e2f45d82c gcc-toolset-12-libatomic-devel-12.1.1-3.4.el8_7.aarch64.rpm 4f1152c477bc307ae6fe0c81f73eb68935dedd5c77fad787446a7a12d7b4f384 gcc-toolset-12-libgccjit-12.1.1-3.4.el8_7.aarch64.rpm ae8710c27d07abf06124e40e7ff192fd3aa2696b88285c47a83c4fc289faf1ee gcc-toolset-12-libgccjit-devel-12.1.1-3.4.el8_7.aarch64.rpm 60aaa4e3896274d107ca7a47c599ed861b5aafedba093926deb29c915dc87789 gcc-toolset-12-libgccjit-docs-12.1.1-3.4.el8_7.aarch64.rpm 97eded8b40592c686bf3fb2b901afe63f92af903c31c1064e65d64d814ecdf4b gcc-toolset-12-libitm-devel-12.1.1-3.4.el8_7.aarch64.rpm a5d3c49ae8cc397dc78d28cb49839567e77aa193558c05021c813f2525a5cb71 gcc-toolset-12-liblsan-devel-12.1.1-3.4.el8_7.aarch64.rpm 0315a4d020b8766acbb5a7f49647d553c074cd673ddbab41165a7be5e98aaabc gcc-toolset-12-libstdc++-docs-12.1.1-3.4.el8_7.aarch64.rpm 1876697d2654135678e4cc75991af1954404ca0af2e03891cbb34364ca3f973e gcc-toolset-12-libtsan-devel-12.1.1-3.4.el8_7.aarch64.rpm 5babf5766f225a82f03fff957ac7eff8562fd154b0f806aa702302820e356804 gcc-toolset-12-libubsan-devel-12.1.1-3.4.el8_7.aarch64.rpm 0493dbfe5eddb6b25c0c36e2697e095ed7b0ffe968ac4197cace83f873e9e575 libasan8-12.1.1-3.4.el8_7.aarch64.rpm 6c88d5361ecfb2161efd232da4bf6720a9e5f9252dca33a6f9b56c88d9244736 libtsan2-12.1.1-3.4.el8_7.aarch64.rpm b4cb1ca449e5d066af03c021acb26b4e0e806f13de7f04cd8176e7096d4ce352 RLBA-2023:0119 tigervnc bug fix and enhancement update Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Bug Fix(es) and Enhancement(s): * x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Bug Fix(es) and Enhancement(s): * x0vncserver incorrectly maps keysym from vncclient running german keyboard (BZ#2150915) rocky-linux-8-aarch64-appstream-rpms tigervnc-1.12.0-8.el8_7.aarch64.rpm c064c255caa37875d61cbd59a652e11ff3d1aebe90e2f2699a862cc868bdd78a tigervnc-icons-1.12.0-8.el8_7.noarch.rpm b48a3f840827e234acbfed0abb08ad08a13cecab1183f3522f442cb6387a1ef8 tigervnc-license-1.12.0-8.el8_7.noarch.rpm 1e5413dc3b70ecc8c912f59c64120131619ce041aab3322a3bde31acedf58b27 tigervnc-selinux-1.12.0-8.el8_7.noarch.rpm 5c869e831f1586662bd5d95602fda5a00a9f83da96ee9fd1327494a391c8c724 tigervnc-server-1.12.0-8.el8_7.aarch64.rpm 5f69536ff9263653058ce98f636e899677b52d5f6a40be1def9442ee8de3fd64 tigervnc-server-minimal-1.12.0-8.el8_7.aarch64.rpm 635122211a5a73725bd30d3d4f1168a2863cd0394da10ab649ab68223db4e4c0 tigervnc-server-module-1.12.0-8.el8_7.aarch64.rpm 366e321dbd79f9370fbf41508766112c5c571fa912da0c362dde3bc68338fa54 RLBA-2023:0122 ansible-core bug fix and enhancement update Use python re to parse service output instead of grep Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ansible-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Use python re to parse service output instead of grep rocky-linux-8-aarch64-appstream-rpms ansible-core-2.13.3-2.el8_7.aarch64.rpm a1bee73ec5193eb3cf4a0dc4620abf2029db3ca60339274e0a5475cd79667790 ansible-test-2.13.3-2.el8_7.aarch64.rpm 4e4203e7f86841b84c825b749274e49e57c7d4b412227cf1d5bb7b8224d787cc RLBA-2023:0125 sysstat bug fix and enhancement update The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity. Bug Fix(es) and Enhancement(s): * There is no option `sadc -f` in sysstat. (BZ#2153422) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysstat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sysstat packages provide the sar and iostat commands. These commands enable system monitoring of disk, network, and other I/O activity. Bug Fix(es) and Enhancement(s): * There is no option `sadc -f` in sysstat. (BZ#2153422) rocky-linux-8-aarch64-appstream-rpms sysstat-11.7.3-7.el8_7.1.aarch64.rpm ebb5091ef5e9b3efa1e9acc6da9fbdb38f5188a2197a7dc768953241fe9b60a9 RLBA-2023:0126 hyperv-daemons bug fix update The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150255) rocky-linux-8-aarch64-appstream-rpms hyperv-daemons-0-0.34.20180415git.el8_7.aarch64.rpm c28b25305d646096540bd808e871ec9bbd19f0422cdec46ce6d646030a2e127d hyperv-daemons-license-0-0.34.20180415git.el8_7.noarch.rpm 812a72780a3d0fc19c399dbaee8b875bd908e69ed8baf4e0be87b822d97f50bd hypervfcopyd-0-0.34.20180415git.el8_7.aarch64.rpm d5845803fc1d0c44bb71be3bc497748229e40a6ba042cfa9ccfc1bf5605a2ebe hypervkvpd-0-0.34.20180415git.el8_7.aarch64.rpm 6d60112db8ad083b23701d0a153591a72dcc646a3e45c781fccf206d018cca46 hyperv-tools-0-0.34.20180415git.el8_7.noarch.rpm c3162949f7f1502cb6fa41f01885ae317db7b864c5b9fdff0436454bc2430d69 hypervvssd-0-0.34.20180415git.el8_7.aarch64.rpm 2d71f3f8cb952197c7423bda2d024a2383744850532614217bb784f63a7668a5 RLSA-2023:0171 Important: dpdk security update The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dpdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms dpdk-21.11-2.el8_7.aarch64.rpm ed1d61fc3de707ae7f4cbfe576c885ba54df8aacd067e44b5459c33aee9866c3 dpdk-devel-21.11-2.el8_7.aarch64.rpm 1074905c48b6c46c5e4d2e99308155c6cc65f0da6aff87b4f989b38a1eaa6031 dpdk-doc-21.11-2.el8_7.noarch.rpm 3e9b40443c42f8992bdc96064f4d90af5dc0e936e6ac17eddb4f385a855311c0 dpdk-tools-21.11-2.el8_7.aarch64.rpm 9caf9afd0f3db593000862a5853387bc1957c992db4fb1f748edeaf8766f6b58 RLSA-2023:0192 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) rocky-linux-8-aarch64-appstream-rpms java-17-openjdk-17.0.6.0.10-3.el8_7.aarch64.rpm f36424dc927e5cf7eec585373f9a0ce102c72a2cbb7e91fc138f48caf48fe051 java-17-openjdk-demo-17.0.6.0.10-3.el8_7.aarch64.rpm af68cbccdaa699fde33b029acb44fa468b19f0a63074aa33a197f38876ae88c2 java-17-openjdk-devel-17.0.6.0.10-3.el8_7.aarch64.rpm 3738de43a88c5a9a0668c65975a287babd2f0097d5af8c4480c349f1e6b2223e java-17-openjdk-headless-17.0.6.0.10-3.el8_7.aarch64.rpm d5894359205bc8e136a145aa63fedc585f3f46dfafddd444ba5e28c3a6c9c7b4 java-17-openjdk-javadoc-17.0.6.0.10-3.el8_7.aarch64.rpm 24ecfba30fb0aee9f927bc129344844cea105caae44c25110e5d6cdc0708f6f6 java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7.aarch64.rpm 9efd144bc08f2b0da20e79453f1c26893cd90c99453a2db61b582f70800d0669 java-17-openjdk-jmods-17.0.6.0.10-3.el8_7.aarch64.rpm 07df86a69f17aed4ea5b9d5f02a119628a7a6c0e2d6b5b93772932f8d0b69f1c java-17-openjdk-src-17.0.6.0.10-3.el8_7.aarch64.rpm 2dc9a0b93b26a81241ad12b6bf03529ed1cd09be78936e10d050c8e055df8eda java-17-openjdk-static-libs-17.0.6.0.10-3.el8_7.aarch64.rpm 0c8278ed1798bd70319b6e4f6db86798fac864c28182a94da84c6b3d27af576c RLSA-2023:0200 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) rocky-linux-8-aarch64-appstream-rpms java-11-openjdk-11.0.18.0.10-2.el8_7.aarch64.rpm cf1f967d41e9c3de6dce149016a35f6103fc6857d3badd27c03a1b94d651b877 java-11-openjdk-demo-11.0.18.0.10-2.el8_7.aarch64.rpm dbb57d1bf854bebce9c92372e5867e396d1c7d6fb5b89fd0c4d69b5ba216145d java-11-openjdk-devel-11.0.18.0.10-2.el8_7.aarch64.rpm 071c5a2e467b8a5a8adf03ba400ec5a372a6f4153313679ffa3a555fd26326f9 java-11-openjdk-headless-11.0.18.0.10-2.el8_7.aarch64.rpm 605cd4b5bcdeb5c592d9844b94f7b0409634ece55a79a0d1075d5eb4429bbedc java-11-openjdk-javadoc-11.0.18.0.10-2.el8_7.aarch64.rpm 28e0a3e79d6ef62571d705acede7b0d7518f0a9e176fe4a3fc3d4d2dd39ca1b8 java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7.aarch64.rpm 164a50e9f69404fe5091294dc20efcce805d9c7d96eab19cecfe2b4b24f9c7dd java-11-openjdk-jmods-11.0.18.0.10-2.el8_7.aarch64.rpm 69561bb8404a8c2cf52cc922b6279f8e1ea217580d226be4dc4bdb282e13885a java-11-openjdk-src-11.0.18.0.10-2.el8_7.aarch64.rpm fdd8979a738f27e0beb3be3f7d6d155cce4d1587a42263141579208fe7c1ba83 java-11-openjdk-static-libs-11.0.18.0.10-2.el8_7.aarch64.rpm b7fa23e64227e721b3fdd646018dc6bff188ed5a79cbe4bb6e0b4ca8ece98571 RLSA-2023:0288 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms firefox-102.7.0-1.el8_7.aarch64.rpm 271c41586417d2e61d3def373279e42e6e3f51f2ce93c2c3f29d46a7392276bd RLSA-2023:0379 Important: libXpm security update X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libXpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms libXpm-3.5.12-9.el8_7.aarch64.rpm ce6e87bb371cfbdc5d3cbfedee4e8dc921da5f8b95c21163f48169bac9b3b12e libXpm-devel-3.5.12-9.el8_7.aarch64.rpm 75f2b86a7f71b8980b8eb658b6d6bd43de053fafb4c63261b46b1411e3578e28 RLSA-2023:0446 Moderate: go-toolset:rhel8 security and bug fix update Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144545) * crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for delve, golang, go-toolset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144545) * crypto testcases fail on golang on s390x [Rocky Linux-8] (BZ#2149313) rocky-linux-8-aarch64-appstream-rpms__go-toolset golang-1.18.9-1.module+el8.7.0+1133+56289a01.aarch64.rpm 0bd272b1d3840b1be98c22643cee957ff0fd96ec2bb60754c49ec935fd419970 golang-bin-1.18.9-1.module+el8.7.0+1133+56289a01.aarch64.rpm fbf5a22f6877f414421fc453623b5955b7d02b7c55a8e7a80ca771b6cbd4dd49 golang-docs-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 9e547f95eec6ffd22d9b5d3228f79071a73669ae38504dd6a88f6cf535034def golang-misc-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 98ab11139193f6c3d5450fdd71d42f292d2c89654fcea60960fcd8ebd1ab0ad4 golang-src-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 5e065b3f60812a5dcc497c556258037b1ccec24238c81cf11e4e1c14a7ffc084 golang-tests-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm 1dd2f5d01b4577af7d7090cd308dd1d8b1e58470fdffd801f4b84ec5b5ea96d6 go-toolset-1.18.9-1.module+el8.7.0+1133+56289a01.aarch64.rpm ae82a7f537ebcf48dab23b14fdd8eb5187da4dcd79d68aba6fbe944cd93b25de RLSA-2023:0463 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms thunderbird-102.7.1-1.el8_7.aarch64.rpm a22c7905481f5c7f1e1bf8c618784c4c0b13410f3c7f0a257a4385c6618978b1 RLEA-2020:4838 dtc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dtc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libfdt-1.6.0-1.el8.aarch64.rpm 9260914bfe9e132f437fd886a880c7bd52305d501eb145026ce770a1ff8adef2 RLBA-2022:2006 python-pip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms python3-pip-9.0.3-22.el8.rocky.0.noarch.rpm 65271a7c3eca9c50250011cda76b6f71dd6d16e467d477bdb7463815f3c72616 RLBA-2022:7739 sssd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms sssd-idp-2.7.3-4.el8_7.1.aarch64.rpm f18f0a8f592c6b5244a370461dbb582d702835409b6b56b40d310217938d6531 RLSA-2022:7790 Moderate: bind security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bind-9.11.36-5.el8_7.2.aarch64.rpm 0ef9654849167ae87d46cc836e88b34e84f75aa497573ad9f64d033a762e1355 bind-chroot-9.11.36-5.el8_7.2.aarch64.rpm dbd49c2dc45013724f72a0c4ca1b01d40f025de37a5625bdaf7f5a4f005844fd bind-devel-9.11.36-5.el8_7.2.aarch64.rpm f75106e899c43b74b71645b26f5966ddf8044860dc52c726d62251c392465718 bind-libs-9.11.36-5.el8_7.2.aarch64.rpm ecbecb2b28fab33dded8d309cbc490a00fae8d80b488abb6c99676a99cd89776 bind-libs-lite-9.11.36-5.el8_7.2.aarch64.rpm ef1cd6dc99d5de6f8a342af03b52bef4d7ab280d27c42a8063b4bd254153d117 bind-license-9.11.36-5.el8_7.2.noarch.rpm 6962b9370b7289b60f13dd744a4686cc326e572e0d78146d05bb2d185cc25609 bind-lite-devel-9.11.36-5.el8_7.2.aarch64.rpm 6a60bb607e7938b520e10dc5ac29e90e71144f5df229d129729d06a91a54c6ac bind-pkcs11-9.11.36-5.el8_7.2.aarch64.rpm 698aa3f3807f10ed387e6c46342687d7929e56cc9074ef6b55f3dadad692b7a4 bind-pkcs11-devel-9.11.36-5.el8_7.2.aarch64.rpm 9195e5682cf29647e22a7f57ab21f06f1ace0980870795bb82e1e292513feeed bind-pkcs11-libs-9.11.36-5.el8_7.2.aarch64.rpm e9582097364962f1292dac756e34bc8131351c5a5ed2146a0622597d99f051dc bind-pkcs11-utils-9.11.36-5.el8_7.2.aarch64.rpm d12f2e391d1583676a8ed0efd70608ef720ed8140e5fcd6acfb83e4a7cf72da7 bind-sdb-9.11.36-5.el8_7.2.aarch64.rpm 9edd6ab36f83a2201b1257c53adacc791810dd61db3cab72139156a52536db68 bind-sdb-chroot-9.11.36-5.el8_7.2.aarch64.rpm 51ccd4f03e8bade01036fe5c5a4c88f5a9a580c4d12887dcaff78c1d6f4c2603 bind-utils-9.11.36-5.el8_7.2.aarch64.rpm a214e111d5501a66f2a3519884f6056a69bcbee8dac6088da904094d95ea1d65 python3-bind-9.11.36-5.el8_7.2.noarch.rpm b218709131629d02a30d045c0bcf541ee2262bbd083d07b35e263675fce0703e RLBA-2022:7832 python3 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) rocky-linux-8-aarch64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.rocky.0.aarch64.rpm 54def845f62d7f5357132a1504ac3535b7684d4a11a364605d8e337289b97d66 platform-python-devel-3.6.8-48.el8_7.rocky.0.aarch64.rpm 2f61187c7c267294ed58364bb97052e3ff07032aad73a80043975c53a056f7d2 python3-idle-3.6.8-48.el8_7.rocky.0.aarch64.rpm 623973cd9aaa4c079ffdb37b74a815a22189191a7bd3f8d68af05e668b76de7f python3-tkinter-3.6.8-48.el8_7.rocky.0.aarch64.rpm f602672c09df65a2b0c533d19ed517b6ac5d94485a91a4002fcb4332697da35f RLSA-2023:0208 Moderate: java-1.8.0-openjdk security and bug fix update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) rocky-linux-8-aarch64-appstream-rpms java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7.aarch64.rpm 7136de90318339dd095b886c813b6eaf33dde64d1be0b7fdb670ca0a8dc33a46 java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7.aarch64.rpm e0205e6c65038dae7d091a5ba03d68de8822a56bf788ead9a45b94d83e35e93a java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7.aarch64.rpm a7a67efe18d3530ba4d7a799769781722a168bcfda4e2574d4442362ac09f713 java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7.aarch64.rpm 313485cd532a398ad85d4b615ce4c53af98e97d08643df724402f25ce8ecf5ec java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7.aarch64.rpm 37441c114f237130021d4a786d5bdf14702d3c431c044e3658be4f7390ebb463 java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el8_7.noarch.rpm faa16af4cabb6f1c12b3c280cc0b0f3933802386268b20e734150fdf7a1a2664 java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el8_7.noarch.rpm ac11250119463f45f90401b0563633a9f252fea39e761a6dfe7e49526e7b1de0 java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7.aarch64.rpm cba5d40909c2e5539f967aa0657d321033195769155bf5a97b2ef0bb106a6caf RLBA-2019:1957 python3 bug fix update Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) rocky-linux-8-aarch64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.rocky.0.aarch64.rpm 54def845f62d7f5357132a1504ac3535b7684d4a11a364605d8e337289b97d66 platform-python-devel-3.6.8-48.el8_7.rocky.0.aarch64.rpm 2f61187c7c267294ed58364bb97052e3ff07032aad73a80043975c53a056f7d2 python3-idle-3.6.8-48.el8_7.rocky.0.aarch64.rpm 623973cd9aaa4c079ffdb37b74a815a22189191a7bd3f8d68af05e668b76de7f python3-tkinter-3.6.8-48.el8_7.rocky.0.aarch64.rpm f602672c09df65a2b0c533d19ed517b6ac5d94485a91a4002fcb4332697da35f RLSA-2023:0662 Important: tigervnc security update Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for tigervnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms tigervnc-1.12.0-9.el8_7.1.aarch64.rpm 842ff50abd9cd2fa5890e9dde5e683bb7d91fffdd484317eda8f55fae75dd831 tigervnc-icons-1.12.0-9.el8_7.1.noarch.rpm 1e7a585b86d309435f29652a9fc2f9a1e07c0797336ad4cc9c31221fc52d76a2 tigervnc-license-1.12.0-9.el8_7.1.noarch.rpm ae82f5bcd77a8bb854d780e344b39c468503cef8767de5e1a114d6c13317173f tigervnc-selinux-1.12.0-9.el8_7.1.noarch.rpm 82279d622f3b7172cde9cfa37e5ed89a4b5f0734e293d0f4c662ed67983bece3 tigervnc-server-1.12.0-9.el8_7.1.aarch64.rpm df1aa8439f613787040a045db9bc61ea0a00697fd574916060c4ee0309995ca0 tigervnc-server-minimal-1.12.0-9.el8_7.1.aarch64.rpm 4df480d1b188fa3e9706cbba7f334637aa2ed69da7ed7365fac877ee149eca36 tigervnc-server-module-1.12.0-9.el8_7.1.aarch64.rpm 18a9d1a8a18cd57e128fe865c91b8fedcb51692e49b5e9cbb2521077e918a50b RLBA-2023:0783 .NET 7.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z] Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z] rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-7.0-7.0.3-1.el8_7.aarch64.rpm ed2c224142825c4fc11553fea72d339180553322ff58c1d70c25fd728a92883f aspnetcore-targeting-pack-7.0-7.0.3-1.el8_7.aarch64.rpm 85523bf14cbecc081e113994c47f6e987d32e5fc89ebda80a16bf7ed70d56fa6 dotnet-7.0.103-1.el8_7.aarch64.rpm eb65cceae6238139d0a3b696efaa9fd8562eb0f4d939ec21d31604732cdc67eb dotnet-apphost-pack-7.0-7.0.3-1.el8_7.aarch64.rpm 6b00277a0aeeaacfe8272f9dda7a5ced9f526577bbc4ad29b70f84dcc9b012f8 dotnet-host-7.0.3-1.el8_7.aarch64.rpm b15ee8ae53b76f62b7a56ff928970bf9782fd1a8223f64ccf678e9bcbdfd19b2 dotnet-hostfxr-7.0-7.0.3-1.el8_7.aarch64.rpm 17d75b86ce0cf8b024862a3a16dd5b2733acf913d9947e989cd4bdf7d33ab2c9 dotnet-runtime-7.0-7.0.3-1.el8_7.aarch64.rpm f364df1ac5e06817aa3d9dc7d177d7f259678ca0d371b05e815f203ffc9b2b7f dotnet-sdk-7.0-7.0.103-1.el8_7.aarch64.rpm 7640d0bab47b5f77515c5b1bc35629f88a29f5611cb25d26a7f2475b2de79851 dotnet-targeting-pack-7.0-7.0.3-1.el8_7.aarch64.rpm 82c1e6fcffc1da04269f0944fa05e22035488637e510da0a984e5040c6b7a8fa dotnet-templates-7.0-7.0.103-1.el8_7.aarch64.rpm 5964b4727cca32d11e65da4f603c57d96cb908898967f6cbf05692ac1bd02d9d netstandard-targeting-pack-2.1-7.0.103-1.el8_7.aarch64.rpm e0e6ca39392d9a811756a4a4cd24c8f8333e333868ff8691d084af63192d2d2f RLBA-2023:0784 .NET 6.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Security Fix(es): * 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z] Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Security Fix(es): * 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z] rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-6.0-6.0.14-1.el8_7.aarch64.rpm 41a901f3f17b1a4a59ce63a2f8ba0d4a865a6d9f4bb946afd14565ae1ca556f0 aspnetcore-targeting-pack-6.0-6.0.14-1.el8_7.aarch64.rpm beb86b3d51d22e460765258a975092a92cb43fe99dd65751ff9640107a22aac3 dotnet-apphost-pack-6.0-6.0.14-1.el8_7.aarch64.rpm 93edb24fa9344afbad3bfc99246de7a5014555cd83cc7d819b804bc6924e723c dotnet-hostfxr-6.0-6.0.14-1.el8_7.aarch64.rpm 71f8e450b23080db957566e4cfb113ce3cc825cf78b5ffb10827dfd861b0ec52 dotnet-runtime-6.0-6.0.14-1.el8_7.aarch64.rpm dc662d37f5c90688d056306ce8f2c83bd589a4b2dc2453bfcd0abe77d02b8536 dotnet-sdk-6.0-6.0.114-1.el8_7.aarch64.rpm bc4baf15fc4cd1a32f0715315d2856ca115a096e0ee8f863f250d957e32b67d4 dotnet-targeting-pack-6.0-6.0.14-1.el8_7.aarch64.rpm a5de522127e8930728faab2d50ccaedc787caad8ee52ba3e4b19f087223355f3 dotnet-templates-6.0-6.0.114-1.el8_7.aarch64.rpm 3251db485dea6bebc330c741c492957f982d19a0bb70018f36b1a28e2022d817 RLBA-2019:3504 bacula bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bacula. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms bacula-client-9.0.6-6.el8.1.aarch64.rpm 358fcd76416fd1d3b1c41e9edbad5adb4b10c261ba3b3507bc60c03bcef2e555 bacula-common-9.0.6-6.el8.1.aarch64.rpm 165ef048f5cd8151d68dc9faf6489cb10a4e370cb2ee0a15772ef88d54b4a1ae bacula-console-9.0.6-6.el8.1.aarch64.rpm 1d557e14251222736cbfc5a34d4ba45756c401781b25e12f0a319560c91cdc3e bacula-director-9.0.6-6.el8.1.aarch64.rpm 41112663efe1c4652298ff85bcf1e9b07baa3ad144b34f71b7027dcbb3397db9 bacula-libs-9.0.6-6.el8.1.aarch64.rpm 9e11033b51f5fc028596aedc8d69ebc1e4df5866f650aebfc3f6ca780f8cfe1c bacula-libs-sql-9.0.6-6.el8.1.aarch64.rpm 5edb6d648547f7aed3c96c6fe3ff86cdcbe3b23a4386b569f867ac27c4836369 bacula-logwatch-9.0.6-6.el8.1.noarch.rpm 3016564651a9da24f61d8c4aa305a02824a187c9091bc1681a52d10a6832d067 bacula-storage-9.0.6-6.el8.1.aarch64.rpm 18f984e4fc067a3d52347cffa01cf998d2f51c6f4b9a11a1b1f80408b0cc65f7 RLEA-2020:4672 autogen bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autogen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms autogen-libopts-5.18.12-8.el8.1.aarch64.rpm 81c89b195825101bb9094a1330531fe6d50036d348f13883c80913144952b51d RLBA-2020:4718 aide bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for aide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms aide-0.16-14.el8_5.1.aarch64.rpm a32c14e2ab712fb56883123a64e80081312bcd1a5f6a9d3f38f6fdcde658d43b RLBA-2020:4734 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms libblockdev-2.24-11.el8.aarch64.rpm d65a33cbd7511662ce715fec7dbafdcc2dd720460e85aba8aa0f3f46d081fd0e libblockdev-crypto-2.24-11.el8.aarch64.rpm a4a7870232d0c3516bb25e148f13a7bfaecee36eb78af126c9dc000e3bce05b8 libblockdev-dm-2.24-11.el8.aarch64.rpm 8eb1b521b94895ddd9dfdf5856375bd01606a3d36c6e6bc8b70050b0f303fbe5 libblockdev-fs-2.24-11.el8.aarch64.rpm 608a3f4bcf3aa116d08c4544db4cf8a01773feaa005087db9331f2237bbf1984 libblockdev-kbd-2.24-11.el8.aarch64.rpm 1c6e1023ebbdccd8ef6275dd98bd06295dbb8cfd61628c7ef61c01909ec2b229 libblockdev-loop-2.24-11.el8.aarch64.rpm 91b7a962898308c7941f783f889181b8252ec4d47b1b889666e0cb5620f810c2 libblockdev-lvm-2.24-11.el8.aarch64.rpm f188672975a0d599ce88bf8c43d0b29e25214fc5e2e6be57b0b0f7870790d7ba libblockdev-lvm-dbus-2.24-11.el8.aarch64.rpm 539b36b4862b477e4a5a4fc1029aaa27fd5ad06e37ed37ae9719d105d0b117bc libblockdev-mdraid-2.24-11.el8.aarch64.rpm 4b6c7515d46083ec5a0367f57dfd3c4e5f730e20ec4ec46924fcd50ef938a4db libblockdev-mpath-2.24-11.el8.aarch64.rpm 2861b06f252ca25faa8c886a881fe7b0922b1027617cf267e800579acbf9f1ac libblockdev-nvdimm-2.24-11.el8.aarch64.rpm f7588167714d06b1cd62145876571ad4a53dd2213d423fa70fae745b6fb3fb2f libblockdev-part-2.24-11.el8.aarch64.rpm 4782cfa42287971c6a469a28de8b367d112dd981ca22de22a30aaac01d37c5f7 libblockdev-plugins-all-2.24-11.el8.aarch64.rpm 7ee9cb6a0222e7c14fc7da2bbce8cdd131997c4eb350997a545cbd00b9dc093d libblockdev-swap-2.24-11.el8.aarch64.rpm 5014db8fdd8b2daf377eea055778b476a4a8c6d59013abb1d099ab0a9fe55e63 libblockdev-utils-2.24-11.el8.aarch64.rpm 82dd38fe6997b65dc8d076629dbe9578ad24b5433ceb2730e6cdff04e16808e2 libblockdev-vdo-2.24-11.el8.aarch64.rpm 9aa6c1eea034a7e92c7b92ad21862a6ce410a71ea495e290a30c5cc5b458669a python3-blockdev-2.24-11.el8.aarch64.rpm 1a1f77846f20f164d841302a9d78daa0c464484b063fb81610820cea1f32bb62 RLBA-2020:4842 anaconda-user-help bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda-user-help. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms anaconda-user-help-8.3.3-1.el8.rocky.3.2.noarch.rpm 12cf830d8c06d8c4a5f9de5f032ec9d3f9fb74fc87c8996c6a0d913e1076a2fb RLBA-2021:1808 clevis bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for clevis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms clevis-15-11.el8.aarch64.rpm 2c3fc9ccccecfb6c60affc258716713cde1ca8b65ea5cc986639977f295c98df clevis-dracut-15-11.el8.aarch64.rpm 029bcd712ab8c51e305ae6e2ddc651883270f17ea2369db67fa6855ee4df0d71 clevis-luks-15-11.el8.aarch64.rpm c66bb94cedf41ccdc684def80898154427cd675d556b4f499a6aa536df5e4b2b clevis-systemd-15-11.el8.aarch64.rpm 8f6290c9e05b96c110ddcc9b10ef0d1ab688b4cff34bbd4f2413d813cc60e59b clevis-udisks2-15-11.el8.aarch64.rpm eda0c12119baba6c89e1d82e231ea8deb56e82f53407edbacbd65fb9eb1c038b RLBA-2021:1864 initial-setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initial-setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms initial-setup-0.3.81.7-1.el8.rocky.aarch64.rpm 3174830ec9073be0d40c7478aad06356fb553deb23fddf75f5f6485af92dab40 initial-setup-gui-0.3.81.7-1.el8.rocky.aarch64.rpm 03d1339f20137a1b5c8b0ee07174b00575fb0ee42fa03840080306a245c2647e RLBA-2021:1934 mod_auth_mellon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mod_auth_mellon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms mod_auth_mellon-0.14.0-12.el8.1.aarch64.rpm 401c60856f299c02a77af736781042317af93d6cd7f00039298d481624829800 mod_auth_mellon-diagnostics-0.14.0-12.el8.1.aarch64.rpm 1f0b441375f9dc0d910c5fdad0bf8a2d9c05d8e1fc004a05bd600b0a415d7e07 RLBA-2021:4247 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms abrt-desktop-2.10.9-21.el8.rocky.0.aarch64.rpm 2408c2a43bddef15c91126eb871685e29ff18e39fc06d1ce375de7867906e667 abrt-2.10.9-21.el8.rocky.0.aarch64.rpm d9bfbe1347617711507d4acde3fd549165498a4257cee53bd5b455ee39a61d90 abrt-addon-ccpp-2.10.9-21.el8.rocky.0.aarch64.rpm f11bf74aa7309836d76718cdbfad9e749608f549a4b70ce6795abd574146f4f0 abrt-addon-coredump-helper-2.10.9-21.el8.rocky.0.aarch64.rpm 84ad8ca25dfeb79c6353f9d5bdebc2246e93ca79079261977d6a8ac86996b739 abrt-addon-kerneloops-2.10.9-21.el8.rocky.0.aarch64.rpm 964e32b108a79e21e0ba857bd0547a5654737930d0a413053b47c23e189f3bda abrt-addon-pstoreoops-2.10.9-21.el8.rocky.0.aarch64.rpm ece13ce66c6971900736a40e2d307eadd4f3f5a9feb1d4402eb3fee3505d3fbd abrt-addon-vmcore-2.10.9-21.el8.rocky.0.aarch64.rpm c63d7119c21fc642ce889eb5e01c134e7384ed6aada499f7cbbd03ca03886b2f abrt-addon-xorg-2.10.9-21.el8.rocky.0.aarch64.rpm 3039f0471ac3b0ac60909a4c60d05a0349075af716a2f067f8645f2f940cd209 abrt-cli-2.10.9-21.el8.rocky.0.aarch64.rpm a641aa51e2ce3758a3c6f8e4d9dd4a699fe30e4fa4dd21707810692e9bcae197 abrt-cli-ng-2.10.9-21.el8.rocky.0.aarch64.rpm a2c7e64dcdd81562a06838abaaceaa22bad51a4efedd009bae1c7c05d78cee69 abrt-console-notification-2.10.9-21.el8.rocky.0.aarch64.rpm 6703c469093cf45f8f6f9351266672916ed7f643ff52f004854eae53f709be11 abrt-dbus-2.10.9-21.el8.rocky.0.aarch64.rpm db5095f330aad393af17769a2cb15b98285c83d0f919287adcbd97a09f4e4194 abrt-gui-2.10.9-21.el8.rocky.0.aarch64.rpm 0b9826174821958e71fa2b1603d9ec419f84532479b3ce744a1e5fc5f3b4cc6b abrt-gui-libs-2.10.9-21.el8.rocky.0.aarch64.rpm 7bcfd265bd5162795e3d58cc286a2028fe9411a0e3a1d1cb5df368e2b64f4478 abrt-libs-2.10.9-21.el8.rocky.0.aarch64.rpm a34e8f2e5b7e61114bb433f953fd5ac2c1a3e6ef71818410e98cbd3a01ee1427 abrt-plugin-machine-id-2.10.9-21.el8.rocky.0.aarch64.rpm 81cf97a465cd0e4e0f054bc91ae512cac6e2fb3e9516941a4514066fe42f7272 abrt-plugin-sosreport-2.10.9-21.el8.rocky.0.aarch64.rpm 8199b580135addc7d5daad1fd5a54ce46e7bacb81c50bec63bf58cc4fb3484a9 abrt-tui-2.10.9-21.el8.rocky.0.aarch64.rpm db6fa692907b555b11ee6059e0c1d63ffaf76e0bf7c3432e0655568f51080e53 python3-abrt-2.10.9-21.el8.rocky.0.aarch64.rpm 53e3aacd190b0195574b3481220935587269bb44ff406e5fb4967a784013919d python3-abrt-addon-2.10.9-21.el8.rocky.0.aarch64.rpm 3360b97a6d9df7d80c8e81303745db0c5a7562413f99b591f6e6c6e51f47a288 python3-abrt-container-addon-2.10.9-21.el8.rocky.0.aarch64.rpm d6492be72f9d5b15dcb43f8cddd61fcd329b4d763c7302494ef45169cd218d2e python3-abrt-doc-2.10.9-21.el8.rocky.0.noarch.rpm f4bb18000e5345149bdf78267d6d1dfd1947fcab62f66c2f1e6f21b2553085bb RLSA-2022:7070 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms firefox-102.4.0-1.el8_6.0.1.aarch64.rpm 1dcfbef9cc142fe30aa8243f6e5f3b12fd3d517f965cce1b979bac0be562166d RLSA-2022:7190 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms thunderbird-102.4.0-1.el8_6.0.1.aarch64.rpm 7f255d388d4149edf2f35e038d4e012b7b080708e9d9caf38329c91718a1011c RLBA-2022:7462 anaconda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms anaconda-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm ee8fce81a94194a5a6bf05a70857266a918a3311ca083a9c563a45582a5b9e4c anaconda-core-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm d62141537b66765aca3198c5891fc54b2e9e4fce0aeac73ee3003dd1e7526688 anaconda-dracut-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm d1854bd3f0bf61bd203261edc4104952fd69381a5abe5e3c623e74829c7167b6 anaconda-gui-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm bf6309c88d416fb143d8c65ff6e71a5aec8f8377e03bc4547c353a5b2bfa4843 anaconda-install-env-deps-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm a454e16ccce0053210060ec32e7070c9804b6a1675354f4aa69acafb29126fee anaconda-tui-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm fcd40ce194ea9f0f930f476453d5b77803d7730a30bc69ac9722a3791a4cd244 anaconda-widgets-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm 71771e399db69c221be98cd573b4aee456392b47c5763a0656630d89f3211983 RLBA-2022:7563 scap-security-guide bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms scap-security-guide-0.1.63-4.el8.rocky.0.1.noarch.rpm b2a48fdcce6aecf0fc3e03ba450c2e5cd7e5d11b7d8d0409e62b4607e1d39d3e scap-security-guide-doc-0.1.63-4.el8.rocky.0.1.noarch.rpm 456dfa8d08ed0c210c6fc9c61c2614d08184c63be5b90e949e285044c11b8cb4 RLBA-2022:7573 pacemaker bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pacemaker. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms pacemaker-cluster-libs-2.1.4-5.el8_7.2.aarch64.rpm 3c279c8129a0be5099d13558f461ab6d2c33572b67f9eff5426076cc03b9099b pacemaker-libs-2.1.4-5.el8_7.2.aarch64.rpm 0a0f6e001dec90bf61a55075b5828485091902ecc6cc44df746f2a9d987fdf77 pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpm a50616f73a2a2e456d3bba21b8b4892c73814cc429db6bd992bd6eecaf5c6d3f RLBA-2022:7576 WALinuxAgent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms WALinuxAgent-2.7.0.6-6.el8.rocky.0.1.noarch.rpm 26ca415b8dd49908429e9eb6083d4021e9e59e6a5b4a104551eb5e1233819458 WALinuxAgent-udev-2.7.0.6-6.el8.rocky.0.1.noarch.rpm 289a7a9eaaa0b08fed39797e3dcff0ca31e1803de199982638d47f7c716002d4 RLBA-2022:7588 lorax-templates-Rocky Linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lorax-templates-rhel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms lorax-templates-rhel-8.7-1.el8.rocky.0.1.noarch.rpm fafa48c90f1691b8b0d7a11db3797202891ebbb40141c69153116989d570ca53 RLBA-2022:7635 openscap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openscap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-appstream-rpms openscap-1.3.6-4.el8.rocky.0.2.aarch64.rpm f373a5471f5be9ecfeb0d125555415e666d65004182f2baca32e3eb67e15da3a openscap-devel-1.3.6-4.el8.rocky.0.2.aarch64.rpm d8eb1bd1241b03bf5cd52773aff2fc27923d83dd26e18946fc0fadc4ea05e07d openscap-engine-sce-1.3.6-4.el8.rocky.0.2.aarch64.rpm 0798e5c90a67a814768088760fcb1f327dc4a51a72be99e0eb30f575b3911b39 openscap-python3-1.3.6-4.el8.rocky.0.2.aarch64.rpm ba62c79caad0d92fdcd50cd269187fa8ae9b5e0a9a2e3fd13cb5dfbe790e5831 openscap-scanner-1.3.6-4.el8.rocky.0.2.aarch64.rpm 3cd1c5a2fc3c0a4d8f8e0b73bcaed2cbf37261c3b8268eef64141c8caad45bfa openscap-utils-1.3.6-4.el8.rocky.0.2.aarch64.rpm 93ee99d3647d069eac0c8e45af5b2dfb235d4cefa4ef3171f40b99cbdd4fe876 RLBA-2022:7831 osbuild-composer bug fix and enhancement update The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for osbuild-composer. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6 (BZ#2136532) rocky-linux-8-aarch64-appstream-rpms osbuild-composer-62-3.el8_7.rocky.0.1.aarch64.rpm 7cb82851247f46b92b51b601d3aeb0052fd78a3ae6c8c8eb25b1a93a4c2be867 osbuild-composer-core-62-3.el8_7.rocky.0.1.aarch64.rpm 131e10c3dcfb4294bf08bfe2c61c4c08c2f57c783b15462b2e7f662e2c8086de osbuild-composer-dnf-json-62-3.el8_7.rocky.0.1.aarch64.rpm 43af84f31571c8754bfe27607923c8ca53c1c8204536a56f20ce5e4a6410db29 osbuild-composer-worker-62-3.el8_7.rocky.0.1.aarch64.rpm 424b4407674d304e82159b12b8354abcad1a52aa173c7d7d890bc57b1c65b240 RLSA-2023:0606 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms thunderbird-102.7.1-2.el8_7.aarch64.rpm ec4a265fd6a16db26e941c24d4014868388d4c1e7f93d217447c42737afc7472 RLSA-2023:0610 Important: git security update Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for git. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms git-2.31.1-3.el8_7.aarch64.rpm e51d9d718447ffc89962dc05d0b82445c8000a2a8474c5bfb597115e704c136e git-all-2.31.1-3.el8_7.noarch.rpm 92c2733e6f2b2645563181303f32f3b2d5a188a7778c8fd4dc8faba73d8fc36e git-core-2.31.1-3.el8_7.aarch64.rpm b688d398ecaf9c82e01051c7a11f06232f83f68bc270cf5cab716c0b2e114473 git-core-doc-2.31.1-3.el8_7.noarch.rpm 4678360948f2e508f9ab7c4b00f80544d20933b3fb18756e6de86f5e7f3ce4b3 git-credential-libsecret-2.31.1-3.el8_7.aarch64.rpm db9b3d0f6e70a438364252d7d126270254aeae37ef8d765fa63f37cf4f12d96d git-daemon-2.31.1-3.el8_7.aarch64.rpm eb66fd843135e3d10e414b185ff90206afda963a33b02e284955fc4865a23752 git-email-2.31.1-3.el8_7.noarch.rpm b34c1136de772988f05da4d6b1f728e055e7e664d644110e539af54d32c1cdd0 git-gui-2.31.1-3.el8_7.noarch.rpm a2a35410f875c09789a0eb2fe5df9aa2f50ccff2358eafa95a27723b28c31375 git-instaweb-2.31.1-3.el8_7.noarch.rpm 3ed7d7cbaff42c2730ad0c2253188f5fbd539093dd6ec17b9af8f1c6263f0ba0 gitk-2.31.1-3.el8_7.noarch.rpm 7647f119c5e1fb3d7b1057b7e21e7a680ad70788929ed67e9b8d31abde6e514f git-subtree-2.31.1-3.el8_7.aarch64.rpm 1285cb0f870ab81f16d9289ef48c519b9b3dea01e55a3f622930899061a22866 git-svn-2.31.1-3.el8_7.noarch.rpm e7ffdb663725cab152b5eafd635a6bc5cf01e4cbd5c3c096d333d41317f36712 gitweb-2.31.1-3.el8_7.noarch.rpm 9bdac44d92e84e6e95ad7e57e44ed9974e875ae07c4d16cede18b0a22504364f perl-Git-2.31.1-3.el8_7.noarch.rpm 8ce9eb777428d346828044559ded2afa7b0f05ad5fb1037d1eca7e5933f549f8 perl-Git-SVN-2.31.1-3.el8_7.noarch.rpm cdd3d630ad5e75fb3c470197cd865f9a75ecb1e06ebec2047937f0544d5d0683 RLSA-2023:0833 Moderate: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms platform-python-debug-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm 406be9d81448dabeaded830a323790e1d008143f7e5b5137f2492e4e2109f3de platform-python-devel-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm bffa908abbf833675d60ad9a7db233082e0ba58d430e061ff7543ecb508cc502 python3-idle-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm fcfe6ab75f9db5bbe30d5bc53da1116d5c323c7d40e218ec8adc292818bab297 python3-tkinter-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm fa8bdb23ffe49b54ab70f8ef25336c2598629449c148b19e21acecde06ad4c4a RLBA-2023:0836 OpenSSH bug fix and enhancement update OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) rocky-linux-8-aarch64-appstream-rpms openssh-askpass-8.0p1-17.el8_7.aarch64.rpm 07591d741562b1a7052fd62aaa0207f04cccb0de2c1d266abb08dadd7717dd13 RLSA-2023:0838 Important: samba security update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms samba-vfs-iouring-4.16.4-4.el8_7.aarch64.rpm d109c0dd58dd7f935a0fe50ae79850c367d65256c80ae20602384dfd92cd2c6a RLSA-2023:0808 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms firefox-102.8.0-2.el8_7.aarch64.rpm be1b192e6961d593b33ffd142d073c96e5c645c113252f398f5ce64e54a88992 RLSA-2023:0821 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms thunderbird-102.8.0-2.el8_7.aarch64.rpm e5c9d1a0b48a33f2c1f21f66fe1f3fff3058eea456d62d4033356d55316b5ce5 RLBA-2023:0829 scap-security-guide bug fix and enhancement update The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2168050) * DISA STIG: SCAP kerberos related findings after realm join (BZ#2168054) * file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2168057) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2168060) * Rules concerning audit check for content of specific files, and not /etc/audit/audit.rules ( ex xccdf_org.ssgproject.content_rule_audit_immutable_login_uids) (BZ#2168063) * The stig rule xccdf_org.ssgproject.content_rule_sudo_require_reauthentication fails due to space in in the "timestamp_timeout" value (BZ#2168066) * Some rules have proper STIG references but they are not part of STIG profile (BZ#2168069) * Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profile (BZ#2168072) * Update Rocky Linux8 DISA STIG profile to V1R9 (BZ#2168075) * Rebase SSG to the latest upstream version in Rocky Linux 8.8 (BZ#2168079) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2168050) * DISA STIG: SCAP kerberos related findings after realm join (BZ#2168054) * file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2168057) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2168060) * Rules concerning audit check for content of specific files, and not /etc/audit/audit.rules ( ex xccdf_org.ssgproject.content_rule_audit_immutable_login_uids) (BZ#2168063) * The stig rule xccdf_org.ssgproject.content_rule_sudo_require_reauthentication fails due to space in in the "timestamp_timeout" value (BZ#2168066) * Some rules have proper STIG references but they are not part of STIG profile (BZ#2168069) * Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profile (BZ#2168072) * Update Rocky Linux8 DISA STIG profile to V1R9 (BZ#2168075) * Rebase SSG to the latest upstream version in Rocky Linux 8.8 (BZ#2168079) rocky-linux-8-aarch64-appstream-rpms scap-security-guide-0.1.66-2.el8_7.rocky.0.1.noarch.rpm dfd5eb2341faf8bd344febca1e8f956ce8c4b8166ceaf62de578ec14f3135927 scap-security-guide-doc-0.1.66-2.el8_7.rocky.0.1.noarch.rpm 759b5bb60fe3c23980c8f6d86623dca109434f3cff6d589d290c2df3bb643373 RLBA-2023:0843 fence-agents bug fix and enhancement update The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * OCF Timeout occurring on fence_ibm_powervs (BZ#2136203) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fence-agents. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * OCF Timeout occurring on fence_ibm_powervs (BZ#2136203) rocky-linux-8-aarch64-appstream-rpms fence-agents-all-4.2.1-103.el8_7.1.aarch64.rpm 258cf1924bb89e35d58b8852c1c5a25bb881632ba9f5decfd25c1f9a547e4e0c fence-agents-amt-ws-4.2.1-103.el8_7.1.noarch.rpm 8c00ccea26f7b360ac09250aa2b2af0172c71fe2a42969dd04e977e239af31dc fence-agents-apc-4.2.1-103.el8_7.1.noarch.rpm 90dafd27ef4ef6dc99f86ca6e72acb76560dc191c212b82fbadb92b8f58a72cb fence-agents-apc-snmp-4.2.1-103.el8_7.1.noarch.rpm 95d84cc1cba8737941dec24ac541b16e2e5375e9ee45d1da49febdb37c6db9f3 fence-agents-bladecenter-4.2.1-103.el8_7.1.noarch.rpm 9f7a7df06ae78995cf11e04e74e5d73adaabe0fdd923ee3b7df0480e53df2de9 fence-agents-brocade-4.2.1-103.el8_7.1.noarch.rpm 362cafe82034539c42cf1c377107f8db5679ee8a44ad30c45b77237ca33df60c fence-agents-cisco-mds-4.2.1-103.el8_7.1.noarch.rpm 0ea69bd61343e42aeee408fc8f0028cb6f8873b7d14e2f3cad2d44e7c3c6cc81 fence-agents-cisco-ucs-4.2.1-103.el8_7.1.noarch.rpm 33d31ee82644f04f2edb6d7916547c4ba1eab1ad9f0a9f68b91a82026a4fffa2 fence-agents-common-4.2.1-103.el8_7.1.noarch.rpm 0a009c76338e52de26effaa57065835fe75e4fc9c863e0f552a686338f0efdeb fence-agents-compute-4.2.1-103.el8_7.1.noarch.rpm 2bade70a59ea019236552e56dfb03904650903bfc297506bd9d6077af1d89811 fence-agents-drac5-4.2.1-103.el8_7.1.noarch.rpm 4821543523adcd5f17f652cf838bbc741942f8887c0c3b9e27f934fd3360e12e fence-agents-eaton-snmp-4.2.1-103.el8_7.1.noarch.rpm 076412f8793f721e3be4bc4bfe162f93be81bea014aa23535516ac37f97c4074 fence-agents-emerson-4.2.1-103.el8_7.1.noarch.rpm 8022b609fac6fbece70d9fcb70cc8fcbfa43f99cb117433dc3d280798f4d4f74 fence-agents-eps-4.2.1-103.el8_7.1.noarch.rpm 1f8736221f4dcfd87c19c217c5be485a1481917887896cece3bd1cf0d592f3a9 fence-agents-heuristics-ping-4.2.1-103.el8_7.1.noarch.rpm 295d65e78509d881d8ae6890a99ec1de078d4e66a8a9472e82a583fec763495a fence-agents-hpblade-4.2.1-103.el8_7.1.noarch.rpm 2119227ac9586301e70369923a3b7e24a82f31b60e1c65127892eb07f26b7fd6 fence-agents-ibmblade-4.2.1-103.el8_7.1.noarch.rpm cb72d5809305a8a8129cf6652c598c9b9805bccac54c3c080e45e344c80eaa07 fence-agents-ibm-powervs-4.2.1-103.el8_7.1.noarch.rpm 85d4ef0da70ee8437ecb256f39f05c5ec2b1b3bc2cf89671a046a460f15e1a05 fence-agents-ibm-vpc-4.2.1-103.el8_7.1.noarch.rpm 1ed9adee37de6f6db948ef4b16a40074f467387f43054ce54028d8ed01ef33db fence-agents-ifmib-4.2.1-103.el8_7.1.noarch.rpm 1d27672002dd97ead87796e5feba88df86700a7e258d6ab0c48e117c885cca3b fence-agents-ilo2-4.2.1-103.el8_7.1.noarch.rpm adb8b31244de569051d719a7e4bde474a81210eef6f736105957065c6c568a34 fence-agents-ilo-moonshot-4.2.1-103.el8_7.1.noarch.rpm 57063d203d256fb552fd11731243d282dfca7da542292f18317dc249c17f6fc7 fence-agents-ilo-mp-4.2.1-103.el8_7.1.noarch.rpm bcf444b0f41d2feb3833dc22f1a5993aed51d24eb961f6cbcf0536a1d5112f15 fence-agents-ilo-ssh-4.2.1-103.el8_7.1.noarch.rpm b0d0ecb30a3941c270e47fc358dc8c3c59949e488b5e6b50e5573373cea0afd6 fence-agents-intelmodular-4.2.1-103.el8_7.1.noarch.rpm a56a98693b50a91d89299ebc7663092c550c458d2cd0b53c8f5f9e7234440cfe fence-agents-ipdu-4.2.1-103.el8_7.1.noarch.rpm ae32c1a30808ccbd570d8352691086866cad26aa9c7b34536c37461a19ce8d35 fence-agents-ipmilan-4.2.1-103.el8_7.1.noarch.rpm aecb4472fe7983ffa2b314871f95b72458ae6eb3a91e681a060754bfbae8d131 fence-agents-kdump-4.2.1-103.el8_7.1.aarch64.rpm b186013e2f277ea0a29d990d67439a9a04ae55ce653ae59788c5c39cd624f3f0 fence-agents-kubevirt-4.2.1-103.el8_7.1.aarch64.rpm e70249358e012f9906cec3fbfcd3c6ff0a962e5e73d274cf8a49947e1dea69de fence-agents-mpath-4.2.1-103.el8_7.1.noarch.rpm e69b95d914b5a3d2da79a18b839560db1fc5ea429dbe7b2635d9a7493063b0c3 fence-agents-redfish-4.2.1-103.el8_7.1.aarch64.rpm baf2f2d6c14f6aba604df2a848b0701076e3dd5af2b2c1e7d8a60cd7372084b0 fence-agents-rhevm-4.2.1-103.el8_7.1.noarch.rpm 730b7a0e703ffacf8e7a46a31192504e3d9b969cf73e9b4c3240424133cb5e17 fence-agents-rsa-4.2.1-103.el8_7.1.noarch.rpm 8c9e7388cdb186c0a929f90152424cc656cb047754dec4bd9f4ed9598895b4c0 fence-agents-rsb-4.2.1-103.el8_7.1.noarch.rpm ae8818ff67e5e22ce7f1daffaf9cbe82e38e404ab921f39116d2d55824d94dae fence-agents-sbd-4.2.1-103.el8_7.1.noarch.rpm bbefee58de8b0123277ab7dd840ea7b5b0b8c429ad8b8b6a7585a20fdcfb2d08 fence-agents-scsi-4.2.1-103.el8_7.1.noarch.rpm cae0b470d289a9f373ba7c53133c2f0c782909e32b121775c7821c2ad7dccc41 fence-agents-virsh-4.2.1-103.el8_7.1.noarch.rpm b635844fdf91ff808687e3ff6071d9c34f1b3b641692277545161ccccce807d6 fence-agents-vmware-rest-4.2.1-103.el8_7.1.noarch.rpm d4f044661287872b3a854baa1818a2c66e6446c1aa3acd010b5bbec8e5456a83 fence-agents-vmware-soap-4.2.1-103.el8_7.1.noarch.rpm 8602fa3a0fa16cb9535b32f0e959318bd53357413745c7e1cd995ab09956a998 fence-agents-wti-4.2.1-103.el8_7.1.noarch.rpm e8b3d2554bf7e50b9e4119c3cbd5ceb43d727db31bed5a4234e682f7a1e4482b RLEA-2023:0844 rpm-ostree bug fix and enhancement update The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es) and Enhancement(s): * backport support for embedded container whiteouts (BZ#2137905) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm-ostree. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es) and Enhancement(s): * backport support for embedded container whiteouts (BZ#2137905) rocky-linux-8-aarch64-appstream-rpms rpm-ostree-2022.10.90.g4abaf4b4-5.el8_7.aarch64.rpm 746813d3dbb88cec99279edb4ede267fb650e0712464cc54e1c9c2e12a6c8dff rpm-ostree-libs-2022.10.90.g4abaf4b4-5.el8_7.aarch64.rpm 4562c396049d82e7268a399217b02279111cd360a359ac3ec9dc68fb437fe79d RLEA-2023:0847 new package: synce4l The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux. This enhancement update adds the synce4l packages to Rocky Linux 8. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for synce4l. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The synce4l packages are a software implementation of Synchronous Ethernet (SyncE) for Linux. This enhancement update adds the synce4l packages to Rocky Linux 8. rocky-linux-8-aarch64-appstream-rpms synce4l-0-3.20221122git9564b5.el8_7.1.aarch64.rpm 4010967aa44f2dfbd220859412d515e82cc7f653be0e3658eff5d8bdec7e23aa RLBA-2023:0846 cloud-init bug fix and enhancement update The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8] Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153182) * systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' [Rocky Linux-8] (BZ#2165945) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cloud-init. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8] Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153182) * systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' [Rocky Linux-8] (BZ#2165945) rocky-linux-8-aarch64-appstream-rpms cloud-init-22.1-6.el8_7.2.0.1.noarch.rpm e14a2aa19017a32ea6cb0c568e931b3fdac42723ded7ab6e824a57f0ad16ae4c RLBA-2023:0850 openscap bug fix and enhancement update The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * xmlfilecontent probe produces invalid OVAL results (BZ#2165577) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openscap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * xmlfilecontent probe produces invalid OVAL results (BZ#2165577) rocky-linux-8-aarch64-appstream-rpms openscap-engine-sce-1.3.6-5.el8_7.rocky.0.2.aarch64.rpm 7c345a24cd9e3f4600991e3844515f997f28e3c234bc0c37192dce21a6740f01 openscap-devel-1.3.6-5.el8_7.rocky.0.2.aarch64.rpm 46cc843a89b37d4a647d0db864f3a41440811314e3117645622909c9f874d444 openscap-1.3.6-5.el8_7.rocky.0.2.aarch64.rpm 29e7f1508d6b09f2f168a1245ca49f06f1f335f45eab01a4ddf1cfe8333b570f openscap-python3-1.3.6-5.el8_7.rocky.0.2.aarch64.rpm 27a5035ba0b50bd8e678b2b86a25321e099fe7f2518415830b47f7ab1079d421 openscap-scanner-1.3.6-5.el8_7.rocky.0.2.aarch64.rpm 1838b9d134fed96a66bf04e1f70127a4c0d09968598937dfd187ac5b873d68d1 openscap-utils-1.3.6-5.el8_7.rocky.0.2.aarch64.rpm 0d5378e6c8a02baa612c40179158b3abbfa175c65f9990b0ec4b544286b6c92d RLSA-2023:0902 Important: webkit2gtk3 security update WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms webkit2gtk3-2.36.7-1.el8_7.2.aarch64.rpm 256f22aad495541d6b7f98a8eea428c3e02639899bcf84d7e2231902bbfe024a webkit2gtk3-devel-2.36.7-1.el8_7.2.aarch64.rpm 8dea8819e0b0827a60c668541e408a07d4e4a7077cf5a57c3a2291409227f732 webkit2gtk3-jsc-2.36.7-1.el8_7.2.aarch64.rpm b65c5d1ce97f073ec1a8030a73681afe5773cc5404ad5c760bc20b555020f348 webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.aarch64.rpm d6ee03e3585df5edeaa3604cd79a580fa113ca26281168a92bb99410ef70dc4b RLBA-2023:1245 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-8.7.0.z] (BZ#2175026) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-8.7.0.z] (BZ#2175026) rocky-linux-8-aarch64-appstream-rpms aspnetcore-runtime-7.0-7.0.4-1.el8_7.aarch64.rpm 8a2d41986717692cdfb65112403cffd3ad9b72b4b9888542973b20f2bf9e4109 aspnetcore-targeting-pack-7.0-7.0.4-1.el8_7.aarch64.rpm 8bab0a50ac84174b388fc44102d70fac138e8faf852a2a6735287524e4f910b3 dotnet-7.0.104-1.el8_7.aarch64.rpm 4acf0e389ff679ad9c9682a43885920e0e01e7e41a771ed1966c52ad650eb8d9 dotnet-apphost-pack-7.0-7.0.4-1.el8_7.aarch64.rpm b251153ed5ea1984f96d156d0e473879e2a98e2dd29fa25be1329ecade0c8124 dotnet-host-7.0.4-1.el8_7.aarch64.rpm 8881b8c91842230315bdf33e0ef32be09cd1904b6d427961cedc2420433ef244 dotnet-hostfxr-7.0-7.0.4-1.el8_7.aarch64.rpm adb3f97055a124ee2e91a2f198094fb36e977f1fed87775a5a684b911f2d3354 dotnet-runtime-7.0-7.0.4-1.el8_7.aarch64.rpm 2848bc4d3f7abc3d882eda1e680e620fb985488d88d927f2c58c432323e900ff dotnet-sdk-7.0-7.0.104-1.el8_7.aarch64.rpm ccf9087a4110fae5b526f8ea91cd9f1d52c030355802befdba7c098b8de086ca dotnet-targeting-pack-7.0-7.0.4-1.el8_7.aarch64.rpm 5aa4b113f4e63de9cf83118d37a67670c077274d8543628245eaa4cb79674829 dotnet-templates-7.0-7.0.104-1.el8_7.aarch64.rpm 326c52e313f9ddbf7013868ab78ed1473762b8b3210cb74530d36a9285d9d73e netstandard-targeting-pack-2.1-7.0.104-1.el8_7.aarch64.rpm 3d92a6ec62a12cee7798a5eb49e85440b2dbcdb3ecb89af7762b4994a802fc93 RLSA-2023:1252 Important: nss security update Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms nss-3.79.0-11.el8_7.aarch64.rpm 118b1734c05421ed8c1e172c9792b41bd92a97f6fef3014c8deba2507460eede nss-devel-3.79.0-11.el8_7.aarch64.rpm ec64938302b62e23f693069c3c3bae12d772c1c8f8e2b7b98d754191be030523 nss-softokn-3.79.0-11.el8_7.aarch64.rpm de4fd823d48e4bb7bb2f119325122b6c34be425e3b62cfd2d2fdf5d9f0a8616f nss-softokn-devel-3.79.0-11.el8_7.aarch64.rpm ed859481ef8f8b1842e3e51e080fa680d8cad61e52ac2827204d1f5ff41b9aca nss-softokn-freebl-3.79.0-11.el8_7.aarch64.rpm 86eefdcd6098bbb92bd355364017727b72ebdb0d91a57361b21b0da6760dcaee nss-softokn-freebl-devel-3.79.0-11.el8_7.aarch64.rpm 0895c457cb0cae1d8ecbd7c6f9115c22c59e5b806e69558e4b011efeca8f4bb4 nss-sysinit-3.79.0-11.el8_7.aarch64.rpm a65793e4530990aff82cf7d4c6b5616bdcd67b251187d4b714ee87ab18a45f28 nss-tools-3.79.0-11.el8_7.aarch64.rpm b1eca13a655505815dfd57ee8d115b85f84d79ea222f478fe052a7b8e4fc8227 nss-util-3.79.0-11.el8_7.aarch64.rpm 2aa41e38616d4736a54f9f998608bdc1abeb31c3511d0e62129998e6bb685829 nss-util-devel-3.79.0-11.el8_7.aarch64.rpm 64fe7e55a30bbd039022815aa64ac1414093827db9f0af1e382639d7b98082d3 RLSA-2023:1336 Important: firefox security update Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.9.0 ESR. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for firefox. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.9.0 ESR. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms firefox-102.9.0-3.el8_7.aarch64.rpm 68bc89d2ec11dfd12af7c24f5333038544aa1543bf7dba1c69f9383bda023432 RLSA-2023:1403 Important: thunderbird security update Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.9.0. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for thunderbird. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.9.0. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-appstream-rpms thunderbird-102.9.0-1.el8_7.aarch64.rpm 2cc2c9fc1884772a8294fe71aae4039e64e5105b98fc210d3cd8226c761d0d77