RLBA-2019:3337
perl:5.24 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2019:3511
libvarlink bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvarlink.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libvarlink-18-3.el8.x86_64.rpm
8e37e2e47c7124cf126c5a8c50ecb56bea0431c3682b3fa3220662bc4bb2ace2
libvarlink-util-18-3.el8.x86_64.rpm
38a78ef47048039886a3a5de0e74f28b61eee097b1bf4fd61430369fceb9cb5a
RLBA-2019:3522
perl-DBD-SQLite bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-SQLite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLBA-2019:3529
perl-Math-BigInt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Math-BigInt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
RLBA-2019:3537
checkpolicy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for checkpolicy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
checkpolicy-2.9-1.el8.x86_64.rpm
99298960b34764108eca6376d69cc572d1db3ef6a1720de07dfe388820d46318
RLBA-2019:3542
python-dmidecode bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-dmidecode-3.12.2-15.el8.x86_64.rpm
85254cde2ec450fb6f2dd9f57f1ecc56fc16a3bea2f6976b62cb69980acfb6cf
RLBA-2019:3546
perl-Socket bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Socket.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-Socket-2.027-3.el8.x86_64.rpm
210f9c20fc35f0db23cc285fe01d48337951f38610e954cefd1bb75bb01a10b2
RLSA-2019:3553
Low: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gdk-pixbuf2-2.36.12-5.el8.x86_64.rpm
b9329e5de8573a782d04cdd35bf6c540349259fd71b05fc097baa6d52fba1cd6
RLBA-2019:3558
libzfcphbaapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libhbaapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libhbaapi-2.2.9-13.el8.x86_64.rpm
5b30454dec6b8cfb4cff21b86b2b2f5ac24bfd8b1670893c6126ddf640a3f249
RLBA-2019:3593
ipset bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipset.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ipset-7.1-1.el8.x86_64.rpm
22501332b1b75b42a98aa341a80edcc098ec54aa78621e2b3fd4e16bac76ffa0
ipset-libs-7.1-1.el8.x86_64.rpm
03f4ddae9fd27fca79b7c20f90405f304d6143d2985d50b3d322626a61bdcaee
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
RLEA-2019:3608
libaio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libaio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libaio-0.3.112-1.el8.x86_64.rpm
c63cf16302ac4d02c13bed0eb384cf131be341a9dbcb413743c897d253b8d5a5
libaio-devel-0.3.112-1.el8.x86_64.rpm
0c255ef4b3da4b21a290923d8a1081444cb52d1b04a49398d23fcba7f4f9fd4c
RLBA-2019:3614
dbus-python bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-dbus-1.2.4-15.el8.x86_64.rpm
178e9fcb7cade5c6078c6992e1e101721f947e6355aa96046910e9c1d2d14a04
RLBA-2019:3616
system-storage-manager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for system-storage-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
RLBA-2019:3621
libidn2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libidn2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libidn2-2.2.0-1.el8.x86_64.rpm
ea3af5771feed5c6e8372db9ab809acb23b7851dfb4936cf9b0ac1cddd9eb6c2
RLBA-2019:3627
python-schedutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-schedutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-schedutils-0.6-6.el8.x86_64.rpm
d1ea85fc24ecd71a567b71b61480b777eefe7d35dc242ee20389ff8063255265
RLBA-2019:3634
blktrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for blktrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
blktrace-1.2.0-10.el8.x86_64.rpm
0079f550f6567e1ddf706546acafa77580996e5db37342ae5ca4547a7cb12b6e
RLSA-2019:3643
Low: gettext security update
The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs.
Security Fix(es):
* gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for gettext.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs.
Security Fix(es):
* gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gettext-0.19.8.1-17.el8.x86_64.rpm
a797ddfcee732000b4e68ecffd7c50ef7cefe51af92246c01e248ab98c3ae3a7
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-devel-0.19.8.1-17.el8.x86_64.rpm
8383d229584bbc38d2b2d335060b9431c46870e86a99762ef1d0b9aba0109fdd
gettext-libs-0.19.8.1-17.el8.x86_64.rpm
558bb32c2c9116a5aa14a745462972f0b8769118a6524aca2ab72bbde863b479
RLBA-2019:3645
gmp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gmp-6.1.2-10.el8.x86_64.rpm
9d85101052864ffa596fe1bd1f2d6fe1349f28a912d4bbe2fe9333d39144734d
gmp-c++-6.1.2-10.el8.x86_64.rpm
dbe706499295b80a71198206294cc230b7ae19724309a58b333563246caa0603
gmp-devel-6.1.2-10.el8.x86_64.rpm
194387ca389070ef23f10cad5b08a7087ccc7ad23f72918de8a66d7f4b15e97e
RLBA-2019:3664
nfs4-acl-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs4-acl-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
nfs4-acl-tools-0.3.5-3.el8.x86_64.rpm
2d5f8433daaef591d5ac4e837dc273b12fd79aee1185982b6e696a33a5ce5dcf
RLBA-2019:3667
mtr bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mtr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mtr-0.92-3.el8.x86_64.rpm
2438e443ba3d25741e0f4b22b08fb41ab6029d6492f96a4d8a09d695b86ec720
RLEA-2019:3677
isns-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for isns-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
isns-utils-0.99-1.el8.x86_64.rpm
5be8b3fbcf614d5e6aa2baa445a2b4ad8d23c50f2eececb1b2c504442bd418b6
isns-utils-devel-0.99-1.el8.x86_64.rpm
cbcc8ce7cf8fb61f618855c2c683fba8f106a1cc7015e11df3ae795857001ae0
isns-utils-libs-0.99-1.el8.x86_64.rpm
e6ee7e4950e05234991b0852a37eadd2ca38656d6e6fb96f1fdd87f29e6d3cde
RLBA-2019:3693
python-requests bug fix update
The python-requests package contains a library designed to make HTTP requests easy for developers.
Bug fix:
* The fix CVE-2018-18074 leads to a regression (BZ#1758261)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-requests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-requests package contains a library designed to make HTTP requests easy for developers.
Bug fix:
* The fix CVE-2018-18074 leads to a regression (BZ#1758261)
rocky-linux-8-x86-64-baseos-rpms
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
RLSA-2020:0633
Important: ppp security update
The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.
Security Fix(es):
* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for ppp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.
Security Fix(es):
* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
RLSA-2020:0902
Important: icu security update
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for icu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
icu-60.3-2.el8_1.x86_64.rpm
f1b4645d5eef72c2e6fb9349b2c324b713964758e8066270718f555fb05ebfcd
libicu-60.3-2.el8_1.x86_64.rpm
5d6b3bcd416ba36bd1107aa5a70db598b52acdf7bd6a8d6f021e591438a3a2bf
libicu-devel-60.3-2.el8_1.x86_64.rpm
6ee3edad33895d25c96dc0b27afb23ee8abd496317283e47bd57cc7ec21b6591
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
RLBA-2020:1759
newt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for newt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
newt-0.52.20-11.el8.x86_64.rpm
f61d82c9f375c4a73cae95f3b3eb41218ce894c906d0c3e32d792f0aec24b939
RLSA-2020:1766
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mozjs52-52.9.0-2.el8.x86_64.rpm
303edb185d9c0ff3b990b76cc1fb526acc4a617c943959b19ca961f2fa65801b
mozjs60-60.9.0-4.el8.x86_64.rpm
39168874c4eb1ee6a23c3ee625e5a0d83e7b15cc3172171e8c3783ba69db5383
RLEA-2020:1767
flatpak bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bubblewrap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bubblewrap-0.4.0-1.el8.x86_64.rpm
caa9312ef14df68d33a27cce5e22d472eac068efda16021394c4d16c2d2e6a04
RLBA-2020:1768
ipcalc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipcalc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ipcalc-0.2.4-4.el8.x86_64.rpm
850ee6e1ed955a3ada21629c5c27f44dddec37d75eea1024d0779a0e08ce30bd
RLBA-2020:1781
ModemManager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ModemManager, usb_modeswitch-data, mobile-broadband-provider-info, libmbim, libqmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
RLBA-2020:1791
libnetfilter_cthelper bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnetfilter_cthelper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libnetfilter_cthelper-1.0.0-15.el8.x86_64.rpm
55d6fea4f31b1767a42b926d7a3c352cc1dd05f5ff3d5d34536cc24aa549f9f8
RLBA-2020:1822
pywbem bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pywbem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
RLBA-2020:1839
mcstrans bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcstrans.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mcstrans-2.9-2.el8.x86_64.rpm
c16a97680ef086ecf9ba0c086a3d71d21f7cd5056a2fec2c86cfce66d3583c35
RLBA-2020:1846
conntrack-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for conntrack-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
conntrack-tools-1.4.4-10.el8.x86_64.rpm
2fb578da41af4312f8395570c02f7d3969a101915df202bb7ab2c2bcff5d62a1
RLBA-2020:1850
pigz bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pigz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
pigz-2.4-4.el8.x86_64.rpm
2de6c9c49c29bb2bb0b0851e1e05c3607576c7708cbbc607ddcb8aa4636c4aa4
RLSA-2020:1852
Moderate: patch security and bug fix update
The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file).
Security Fix(es):
* patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for patch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file).
Security Fix(es):
* patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
patch-2.7.6-11.el8.x86_64.rpm
2a9c37c04fdb645c14de1a32eb344cdc53f29c2da8c75267264f4b632630163b
RLBA-2020:1853
diffutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for diffutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
diffutils-3.6-6.el8.x86_64.rpm
a1b4592d6a8f9c88ed8cc427f053779177a16439b93535179b569031adc87788
RLBA-2020:1871
openssl-pkcs11 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssl-pkcs11.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
openssl-pkcs11-0.4.10-2.el8.x86_64.rpm
22c10f2160b0de3f3e14bcc113a2a213168c7aa33941c8c40aed08856eb104c5
RLBA-2020:1891
arpwatch bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for arpwatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
arpwatch-2.1a15-44.el8.x86_64.rpm
4aba514a9ecd56d2107585b268a7e4a967afb0806c18a2f3711d2636464f2efa
RLBA-2020:1902
liberation-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liberation-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
RLBA-2020:1910
cifs-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cifs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cifs-utils-6.8-3.el8.x86_64.rpm
287a82f37e037b668afdef6add67ff15f36f21f07355e04626130777e7866c66
pam_cifscreds-6.8-3.el8.x86_64.rpm
f9681d292cefcf13793c8d4e8b5e3c20c2fd0613f0160502a4f320a3ecc76745
RLBA-2020:1919
ppp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ppp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
RLSA-2020:2231
Important: Rocky Enterprise Software Foundation Ceph Storage 4.1 security, bug fix, and enhancement update
Rocky Enterprise Software Foundation Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Security Fix(es):
* ceph-ansible: hard coded credential in ceph-ansible playbook (CVE-2020-1716)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information refer to the CVE page(s) listed in the References section.
Bug Fix(es) and Enhancement(s):
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Ceph Storage 4.1 Release Notes available at:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.1/html/release_notes/index
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for smartmontools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Security Fix(es):
* ceph-ansible: hard coded credential in ceph-ansible playbook (CVE-2020-1716)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information refer to the CVE page(s) listed in the References section.
Bug Fix(es) and Enhancement(s):
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Ceph Storage 4.1 Release Notes available at:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.1/html/release_notes/index
rocky-linux-8-x86-64-baseos-rpms
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
RLSA-2020:2755
Important: nghttp2 security update
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nghttp2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libnghttp2-1.33.0-3.el8_3.1.x86_64.rpm
4a890e3f3c76faec98ac34935a4bd5c79de22ddda79b4d4884729a999f507557
RLSA-2020:3654
Moderate: libcroco security update
The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library.
Security Fix(es):
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libcroco.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library.
Security Fix(es):
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libcroco-0.6.12-4.el8_2.1.x86_64.rpm
2278152c40bd3053c1dbc8dbd00dd59883cd839dcc8c11738bbe26cc520d246f
RLBA-2020:4434
net-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
net-tools-2.0-0.52.20160912git.el8.x86_64.rpm
39265a074e5b4fb1e67e4c6531dc96d5a39fe1d2799a45267a137abde80dc795
RLSA-2020:4436
Low: gnome-software and fwupd security, bug fix, and enhancement update
The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop.
The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers.
The fwupd packages provide a service that allows session software to update device firmware.
The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2).
Security Fix(es):
* fwupd: Possible bypass in signature verification (CVE-2020-10759)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for appstream-data, libxmlb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop.
The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers.
The fwupd packages provide a service that allows session software to update device firmware.
The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2).
Security Fix(es):
* fwupd: Possible bypass in signature verification (CVE-2020-10759)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libxmlb-0.1.15-1.el8.x86_64.rpm
b10eb2df2f927d4f350fc7eda0210589a952bf6ed4aba81a9276bee26b605b1e
RLBA-2020:4437
python-setuptools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-setuptools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
RLSA-2020:4451
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libsoup-2.62.3-2.el8.x86_64.rpm
016ca0305984238d33fea53cf9c1b3d7c80d104d941d2b0ba564e82877c7fe7d
python3-gobject-base-3.28.3-2.el8.x86_64.rpm
054d5e126a9616b4597b76efb2866d407c07aa583f35f59d1a641536166e419d
RLBA-2020:4452
libhugetlbfs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libhugetlbfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libhugetlbfs-2.21-17.el8.x86_64.rpm
611454dbdaee76de3866dae2441a1f2b4f48cb2b83b281969f5fdb3a5bf87395
libhugetlbfs-devel-2.21-17.el8.x86_64.rpm
d4a09e04231a2a731f6ec0bd22fe3748b1dd58c133bf41787ed418af16f4ebc3
libhugetlbfs-utils-2.21-17.el8.x86_64.rpm
363c463d261b44cd8f2aa186664a1c2013818d9f4763244f246710c8c2405c55
RLEA-2020:4468
lsof bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lsof.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
lsof-4.93.2-1.el8.x86_64.rpm
b4d2f4694b9c55482198c5d525c358186ce46efd96557731044c72e7aede1c1a
RLEA-2020:4487
smartmontools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smartmontools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
RLBA-2020:4488
libkcapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libkcapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libkcapi-1.2.0-2.el8.x86_64.rpm
4132f4295574f5e253182356ca865f319830192f02463230b88eea53ca01e863
libkcapi-hmaccalc-1.2.0-2.el8.x86_64.rpm
d3b39fc9d0daf55a3db203b4cfba9794b6e280db190a30de4760fef86b827e74
RLBA-2020:4501
iprutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iprutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iprutils-2.4.19-1.el8.x86_64.rpm
675b4d270e6f975c69e3d058cc1264c5c69fd2af1ae21302ee8ee46014bf559c
RLEA-2020:4506
python-configshell bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-configshell.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
RLBA-2020:4512
libteam bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libteam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libteam-1.31-2.el8.x86_64.rpm
152bf33845fd06b584d2998be9c4f4bfd6e3bed869890881c83d7465113c017e
libteam-doc-1.31-2.el8.x86_64.rpm
6a9e9a225d53f8ae97e6821e283f62a2d9b5234ba01567aafb8c8fb147bb7952
network-scripts-team-1.31-2.el8.x86_64.rpm
8ce10c87c100dc14c61f84d527d4aab03a5c4ced3dc9fedf33e7a42047ecd623
teamd-1.31-2.el8.x86_64.rpm
cb0ee7ee6223e6a77792f23611cecd151c84018f4d060a6767572b705a29ed95
RLBA-2020:4522
libqb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libqb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libqb-1.0.3-12.el8.x86_64.rpm
c71e8a2594210d6db2747e8db26b37b87c3a198b41bc8d908cc87d8b9df4dc9f
libqb-devel-1.0.3-12.el8.x86_64.rpm
be742d786bdbf7a50d32ee3ea1a0e38241e4a7591b9dbb9230dea307cc0d9159
RLBA-2020:4538
logrotate bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for logrotate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
logrotate-3.14.0-4.el8.x86_64.rpm
73460643270dd618329b637a9bc9e2e96b7b70c346ed008e6b763b505eb48fc5
RLEA-2020:4555
libpsl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpsl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libpsl-0.20.2-6.el8.x86_64.rpm
959ed630f56f3d83a87a857e9d3e6f5b835bbed6081bf304a8a5929ca4f7c34d
RLEA-2020:4556
libnetfilter_queue bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnetfilter_queue.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libnetfilter_queue-1.0.4-3.el8.x86_64.rpm
9526e529709b247f3beb1bff8b02e37b8ef6dd47d1f63cc4df81d398ee342734
RLBA-2020:4557
zstd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zstd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libzstd-1.4.4-1.el8.x86_64.rpm
c3e950878a53d2e6743af8338cf5f0b1afb053034c9eee5ea6797e352d72eca0
libzstd-devel-1.4.4-1.el8.x86_64.rpm
331809e24bcf0caad686f00dfcad0cd3d75b7bd623402194d31e3eb2d2b5f5f9
RLBA-2020:4564
kabi-dw bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kabi-dw.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kabi-dw-0-0.10.20200515gitb52ac13.el8.x86_64.rpm
1396a3dfcfc4628e0a611e1a24be8f05e1c61a0e7c49f5cbb4573eed87867ee6
RLBA-2020:4580
kbd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kbd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kbd-2.0.4-10.el8.x86_64.rpm
b977c7a619b0b6169de05a40808a1b08155cca9978fbb6b413489d564444f42b
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
RLEA-2020:4587
libusbx bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libusbx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libusbx-1.0.23-4.el8.x86_64.rpm
86732e3f404203f7874186f7593dbef63fba7f57ad82cce2a1de415e2759e7ed
libusbx-devel-1.0.23-4.el8.x86_64.rpm
678fa879f4c07f3ae2e365d1e84799baa844822284d83f203867edb7d49e8055
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
RLBA-2020:4592
psmisc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for psmisc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
psmisc-23.1-5.el8.x86_64.rpm
a69d8873b2131a2322457e26850d9b9a33daf98f2143f648cd418e7fe1aec9ce
RLEA-2020:4596
efivar bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for efivar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
efivar-37-4.el8.x86_64.rpm
8904e32e3d0204410a7eb6ec2f0ee99a7ed6fcaa43c2c92a5cc5b34c61b5bb83
efivar-libs-37-4.el8.x86_64.rpm
b8284762feb00345dfbb8d8e5257e6ae09e8e135907d2e57ee1df79d5b166a8f
RLBA-2020:4600
snappy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for snappy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
snappy-1.1.8-3.el8.x86_64.rpm
2acdbf72851dbba66011a9f66397eeab45a9b48385e9462cee327bc3996deee6
RLEA-2020:4680
lmdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lmdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
lmdb-libs-0.9.24-1.el8.x86_64.rpm
79d1d3d6adae5cbea37a12157bf7b625b4868d61ba01abd4cd6134f973dfa350
RLEA-2020:4727
new module: perl:5.30
This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2020:4767
perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2020:4802
perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLBA-2020:4841
liburing bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liburing.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
liburing-1.0.7-3.el8.x86_64.rpm
42cc626f78d9460239168948760b8ad1992cd7050a53c889c1e50ab654c83953
RLBA-2021:0564
dbxtool bug fix and enhancement update
The dbxtool packages provide a command line utility and a one-shot systemd
service for applying UEFI Secure Boot DBX updates.
Bug Fix(es) and Enhancement(s):
* [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is
malformed' (BZ#1912474)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbxtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dbxtool packages provide a command line utility and a one-shot systemd
service for applying UEFI Secure Boot DBX updates.
Bug Fix(es) and Enhancement(s):
* [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is
malformed' (BZ#1912474)
rocky-linux-8-x86-64-baseos-rpms
dbxtool-8-5.el8_3.2.x86_64.rpm
db6f49de47d206b32aeaec6ca21494df84ba9cd832fa3c8214c71acf9155732d
RLSA-2021:0618
Important: stunnel security update
Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption.
Security Fix(es):
* stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for stunnel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption.
Security Fix(es):
* stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
stunnel-5.56-5.el8_3.x86_64.rpm
007b91d221867f26728ec23985fdc988ae188615edab218683cc910e03135e57
RLSA-2021:1586
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gamin-0.1.10-32.el8.x86_64.rpm
e2bb04623867c9df4b216726746d35e807471d4a2c2d2762c62be19b5ceb24c3
RLBA-2021:1587
librabbitmq bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librabbitmq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
librabbitmq-0.9.0-3.el8.x86_64.rpm
394dee37cc31d56e94a4b11529f302a8035d46bbcaa525dbb2970ad28e5449b0
RLBA-2021:1591
libxslt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxslt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libxslt-1.1.32-6.el8.x86_64.rpm
9835b367c819ac0145a2981f5a4c8706d27c01086db8bd37b9ca3a2000d2a912
RLBA-2021:1599
memtest86+ bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memtest86+.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
memtest86+-5.01-20.el8.x86_64.rpm
731ecc28e5fcfb659cc3cccc10d4f991ccafbb487ea38875b54a10f70e0b7d3f
RLSA-2021:1600
Moderate: opensc security, bug fix, and enhancement update
The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures.
Security Fix(es):
* opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570)
* opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571)
* opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for opensc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures.
Security Fix(es):
* opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570)
* opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571)
* opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
opensc-0.20.0-4.el8.x86_64.rpm
90025cea2f96b0c026abfb8070d3fce48f42d7e1471ec16ac15fd8ae5914010d
RLSA-2021:1609
Moderate: p11-kit security, bug fix, and enhancement update
The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files.
The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853)
Security Fix(es):
* p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361)
* p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362)
* p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for p11-kit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files.
The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853)
Security Fix(es):
* p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361)
* p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362)
* p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
p11-kit-0.23.22-1.el8.x86_64.rpm
9f5dc45c3d292f4de8d942344546c66a5cca10d5a87676855d0cd12c11f1f72d
p11-kit-devel-0.23.22-1.el8.x86_64.rpm
4e6994a41a394d1a9d1741ba2c8347a9d018f69db5581e17555c9b803c005d4f
p11-kit-server-0.23.22-1.el8.x86_64.rpm
987cdbf6d866c5645723dd066c6fde16b9a684c0457f4600f90e04e0717e75d7
p11-kit-trust-0.23.22-1.el8.x86_64.rpm
050416bf341c01cacc9b6f5e815261ca96ea2fefdb8463238779665bb55a5704
RLBA-2021:1612
avahi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
avahi-0.7-20.el8.x86_64.rpm
30ae1a91bfb06b039d06c46116973863d9d456167444d9bf38d958db678e4c9d
avahi-autoipd-0.7-20.el8.x86_64.rpm
b9a86831b5c1a2bdc66cf9eb87bc1b90addb654c193fc6afc8cc6337a08b254d
avahi-glib-0.7-20.el8.x86_64.rpm
0224bd59eef3020c7c236f708b218468de8620a0a911607e41dd31083c67b2e5
avahi-gobject-0.7-20.el8.x86_64.rpm
deff9ad93a1c8146f0176e3b12c4486b8936978750fe704329f041c6163bebaf
avahi-libs-0.7-20.el8.x86_64.rpm
4025ada765b99bd04a94850b628b480d30d997674671bd78d2f73ed3acf37a55
python3-avahi-0.7-20.el8.x86_64.rpm
894452b2d8041877e03ce500b4cb5002ac5a9031ae95cf88b41100e0b90aee09
RLBA-2021:1619
efi-rpm-macros bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for efi-rpm-macros.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
RLSA-2021:1627
Moderate: trousers security, bug fix, and enhancement update
TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware.
The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782)
Security Fix(es):
* trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331)
* trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332)
* trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for trousers.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware.
The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782)
Security Fix(es):
* trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331)
* trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332)
* trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
trousers-0.3.15-1.el8.x86_64.rpm
8f1492620ac321ff0378faa79995d7f354700cf33519301a3125e70a590f2c35
trousers-lib-0.3.15-1.el8.x86_64.rpm
c50f3d36f6be357210617fd2069888b74eb518e3f0e142056b40c3ba7ce5f3b8
RLBA-2021:1628
tpm-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tpm-tools-1.3.9.2-1.el8.x86_64.rpm
aed34d6a2d00ab7d34ef7c4ca9e94bf7dd68eaa181f39e06eb8c07090ccf478f
tpm-tools-pkcs11-1.3.9.2-1.el8.x86_64.rpm
6510710eb7e3864b257fe5e634e95347b84edb6aa6c6bdb90a53efbdc6348b82
RLSA-2021:1631
Moderate: python-urllib3 security update
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-urllib3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
RLEA-2021:1658
pciutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pciutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
pciutils-3.7.0-1.el8.x86_64.rpm
97afa829cd42b70ed06b0a497db799eb06525945416f1fda6ff91863ca1e316e
pciutils-devel-3.7.0-1.el8.x86_64.rpm
c02c7068a22d27095c55832156e3d3accb08b4299ffa259c784d1136b5180a48
pciutils-libs-3.7.0-1.el8.x86_64.rpm
d97cbac7e974dab3d1aa88db24194c102e759d909f35ba2807cfd17deb8d3b2f
RLBA-2021:1660
tpm2-abrmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-abrmd, tpm2-abrmd-selinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
RLEA-2021:1673
crda bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crda.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
RLBA-2021:1681
vhostmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vhostmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
vm-dump-metrics-1.1-5.el8.x86_64.rpm
d5a7b53ed53d2503d818049c5fb561377cd5f1ace739beba335ce48dd1d1ab98
vm-dump-metrics-devel-1.1-5.el8.x86_64.rpm
a5b11669af8695899b18d1e6afb7b6611bbd4e48daab04f17f56de6f94cef8dd
RLBA-2021:1687
dejavu-fonts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dejavu-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
RLBA-2021:1689
librepo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo, librhsm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
librhsm-0.0.3-4.el8.x86_64.rpm
e4f0012ac340a8aed1beec50849c7bc34371b3d24ce309fa7aee53ed9174a9e4
RLBA-2021:1691
iptraf-ng bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptraf-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iptraf-ng-1.2.1-2.el8.x86_64.rpm
f9cde3158fcb23d84e78d04b3a5096aac4cd663ec575abbd9f8193c5c96b0cc9
RLBA-2021:1696
intel-cmt-cat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for intel-cmt-cat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
intel-cmt-cat-4.0.0-0.el8.x86_64.rpm
05fbb612d67a4d61e6d901f5d8b3e8f3c3361db07e0f52f8cc210546d7f7fe81
RLBA-2021:1698
python-ply bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-ply.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
RLBA-2021:1699
crontabs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crontabs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
RLSA-2021:1702
Moderate: brotli security update
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for brotli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
brotli-1.0.6-3.el8.x86_64.rpm
f846cb5edaec93436789fe3316a715d5a756aa49c8b40b2fb8f681e7aecbaa75
RLEA-2021:1707
bolt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bolt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bolt-0.9.1-1.el8.x86_64.rpm
82534e4daf0aa98f655c94d4a17647c6a7b60d5c38b85e0489dcb068cbbaa687
RLBA-2021:1709
popt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for popt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
popt-1.18-1.el8.x86_64.rpm
5d98fd70ff26cbe70d7aad9284c670b45eba929720af926195951259d7f32484
popt-devel-1.18-1.el8.x86_64.rpm
bde242a3b19bdb49aee62adc4476c50fe96f25d353f51b116de6c5540bb6ccc7
RLBA-2021:1710
dlm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dlm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dlm-lib-4.1.0-1.el8.x86_64.rpm
40c70647d26d0c291fca3f735ff9547274bdba2770d5b50fbcb61d6b2c10d6bf
RLEA-2021:1712
libpcap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libpcap-1.9.1-5.el8.x86_64.rpm
5dc7df40d3f6df0f4e3917763e27e9d7c4e5e8be23e05ac19c592e0357a3c6cb
RLEA-2021:1720
ima-evm-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ima-evm-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ima-evm-utils0-1.3.2-12.el8.x86_64.rpm
3351a219037ab601a2d699d120fe2217c788e6335facd6c38a6f18c2dab9aedf
ima-evm-utils-1.3.2-12.el8.x86_64.rpm
3eb4c27783d75c704fdf237704de6be746bda7cd987f8234ccf77dbe2ff8b0e9
RLBA-2021:1731
userspace-rcu bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for userspace-rcu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
userspace-rcu-0.10.1-4.el8.x86_64.rpm
d7b32acc512ce9cceb8fbc21762930cd836b128d718ca4755a3e2e2c06a620d4
RLBA-2021:1732
squashfs-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for squashfs-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
squashfs-tools-4.3-20.el8.x86_64.rpm
722139c23a9e1471495be553a92e712663cd62cedc5f5f1e6aae0f1cc862046e
RLSA-2021:2575
Moderate: lz4 security update
The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems.
Security Fix(es):
* lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for lz4.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems.
Security Fix(es):
* lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
lz4-1.8.3-3.el8_4.x86_64.rpm
e74ca5fb78b28ff0c60bfdee2afdc2f3a23aac1da30dbf52c28f92e576542278
lz4-devel-1.8.3-3.el8_4.x86_64.rpm
15e64b28e17640ad880eae7dcac02406ffb01ef9691d8f8de44f232717bc94e7
lz4-libs-1.8.3-3.el8_4.x86_64.rpm
cf76cb56e26c49ceed4d164973aaf69406111ecb9f93e15c4ee700522a0a9757
RLBA-2021:3049
pcsc-lite bug fix and enhancement update
PC/SC Lite provides a Windows SCard compatible interface for communicating
with smart cards, smart card readers, and other security tokens.
Bug Fixes:
* Increase global reader array size to 48 to address issue with RHCS secure
channel creation (BZ#1972569)
* Increase global reader array size to 48 to address issue with RHCS secure
channel creation (pcsc-lite-ccid) (BZ#1973405)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcsc-lite-ccid, pcsc-lite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PC/SC Lite provides a Windows SCard compatible interface for communicating
with smart cards, smart card readers, and other security tokens.
Bug Fixes:
* Increase global reader array size to 48 to address issue with RHCS secure
channel creation (BZ#1972569)
* Increase global reader array size to 48 to address issue with RHCS secure
channel creation (pcsc-lite-ccid) (BZ#1973405)
rocky-linux-8-x86-64-baseos-rpms
pcsc-lite-ccid-1.4.29-5.1.el8_4.x86_64.rpm
aba4eda22537cf9f3182593fc6ef43d3ac218cc095949016a0eb998dce853828
RLBA-2021:3594
libdb bug fix and enhancement update
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
rocky-linux-8-x86-64-baseos-rpms
libdb-5.3.28-42.el8_4.x86_64.rpm
e120f803a572ad17c97a147a445b277ab4da0c8dc3055d8177e2e4a5d5c21443
libdb-utils-5.3.28-42.el8_4.x86_64.rpm
8dd3d399f5155f38d32d28f267aadcbb6cf82de9f3f31748bb0bb046e8535b74
RLBA-2021:4353
lm_sensors bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lm_sensors.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
lm_sensors-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fbf858b3602ccbcac70ce6100533fccd03f2a90e3490ac178771db0ff09a7fc
lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
44311bbcaa8d84aaa563892234bb315039e9bd3f6b48362c7bb670005d2b540e
lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fa5a3bef7d33ed5016011ba6d56f79f67f28b7975edbae2d85dc7f38c9b0fdd
RLBA-2021:4354
libndp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libndp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libndp-1.7-6.el8.x86_64.rpm
c5f6db3d2900eff8aee15514e5519f34c07950b9b1b0989eb0a43a9f1a7ec52b
RLBA-2021:4363
gfs2-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gfs2-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gfs2-utils-3.2.0-11.el8.x86_64.rpm
3941e1e57372dc8d506a46f1dd5b7fed57ed21a207957cd5ed9c34203533027a
RLBA-2021:4371
libxcrypt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxcrypt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libxcrypt-4.1.1-6.el8.x86_64.rpm
da47347fe8c12a83da4b3dc141396172f82cde14530b7746b2c0882651f1a468
libxcrypt-devel-4.1.1-6.el8.x86_64.rpm
71242b7ce34cbadc0eb117e4608887ddd64236e7e808fb593f9b3d7cccdcbc40
RLSA-2021:4373
Low: pcre security update
PCRE is a Perl-compatible regular expression library.
Security Fix(es):
* pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838)
* pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pcre.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PCRE is a Perl-compatible regular expression library.
Security Fix(es):
* pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838)
* pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
pcre-8.42-6.el8.x86_64.rpm
0c64dc4099b1af3af95760d573660c792e6df7a68eb5f45f7fdd5b1f5d2879fa
pcre-cpp-8.42-6.el8.x86_64.rpm
e23bf040432a3b44b439d5901152bf64e04fca000f521f6b77ef76d7162b7485
pcre-devel-8.42-6.el8.x86_64.rpm
ac5874c0838cee6599d1b8945bee116857f3ebb445ea0c9453bb0aefe386f1c6
pcre-utf16-8.42-6.el8.x86_64.rpm
42f4dfe51d519b6eaaf0626a562dd2f2403fe13e0d3eaee4d6c1e5d4da26dd89
pcre-utf32-8.42-6.el8.x86_64.rpm
ea60d759ffef7c5a8556fe94a745db713769b813ca31ac9995e171ad3dc84563
RLBA-2021:4377
quota bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for quota.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
quota-4.04-14.el8.x86_64.rpm
42cfc13ec40dff5cc57d8dfde98c9b4a9715a3ded7a66997857d960cb6ab0b36
quota-doc-4.04-14.el8.noarch.rpm
7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6
quota-nld-4.04-14.el8.x86_64.rpm
781fa685aed427ecd46644f9dcb9de1f0001bc38e4c54d77094ffd236904e46e
quota-nls-4.04-14.el8.noarch.rpm
e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a
quota-rpc-4.04-14.el8.x86_64.rpm
19bffbeadf9050e05d918ee518fb991f31ad4cfa5f86ea8974200b7f8f53d0be
quota-warnquota-4.04-14.el8.x86_64.rpm
657bd785cf526d0b1b9d5da8d0f64da4cc39ce00698702b01885c0dd80240ffd
RLBA-2021:4379
watchdog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for watchdog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
watchdog-5.15-2.el8.x86_64.rpm
612e8baade6a563487c128316ed541ba2f99459d8f40ecb3c10c439c63ceb142
RLSA-2021:4381
Moderate: GNOME security, bug fix, and enhancement update
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gsettings-desktop-schemas-3.32.0-6.el8.x86_64.rpm
ef0bee544ec9f62c9d8746d753fdbef129a1d5a1d94c19cc503d69396239c57a
RLBA-2021:4383
nvmetcli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvmetcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
nvmetcli-0.7-3.el8.noarch.rpm
4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743
RLBA-2021:4397
logwatch bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for logwatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
logwatch-7.4.3-11.el8.noarch.rpm
f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764
RLEA-2021:4405
libmodulemd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmodulemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libmodulemd1-1.8.16-0.2.13.0.1.x86_64.rpm
791de2a73652210cf934938ed23743fe9c57039be70ebc9c11cdd5d47288050b
libmodulemd-2.13.0-1.el8.x86_64.rpm
0298da65634ed07cd6641dc0b56a63e437597cc5632a71645a00b8cec036a7de
RLBA-2021:4406
numactl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numactl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
numactl-2.0.12-13.el8.x86_64.rpm
f35d143255025717a8c38c8eb94a74cc198a6d38be89b3cf542ef5c17b4f017c
numactl-devel-2.0.12-13.el8.x86_64.rpm
7cd411111dc352df3e571b12ca0c462e4fb149280bf3ff6f0c7d06d68c7c57d8
numactl-libs-2.0.12-13.el8.x86_64.rpm
47219636d1d240e8ab5a55ac2f52160dc79a3c36347c7331870d79e3fbb11069
RLBA-2021:4411
tpm2-tss bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-tss.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tpm2-tss-2.3.2-4.el8.x86_64.rpm
d8a2682594c9cf11b6d0561ad3cd77e3c10bcca1c845e08b552ef689e300e11b
tpm2-tss-devel-2.3.2-4.el8.x86_64.rpm
40ee98fb00e7230eb141e2f19b37cbf1932598c6e158f2b7665b863f4c7a3cc1
RLBA-2021:4412
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
opensm-3.3.24-1.el8.x86_64.rpm
6d8802477c76749b1a39e38cdf98d861e093d275d32e48f44919509c531cb44b
opensm-libs-3.3.24-1.el8.x86_64.rpm
76ae7bf9dc394388d177fe4b319e3d35e99926b0e3acbb9b2ac6313140de7231
opa-fm-10.11.0.2.1-1.el8.rocky.x86_64.rpm
e750e63c2625f670d507b56dffb5c064fd8c909f4bc2b78cfcc896c52a76f8d0
perftest-4.5-12.el8.x86_64.rpm
9ed6fb66f98e8716a208a58fc6a7c48cc26acf962319aae6f68e336cd1f4e258
RLSA-2021:4413
Moderate: tpm2-tools security and enhancement update
The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space.
Security Fix(es):
* tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for tpm2-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space.
Security Fix(es):
* tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tpm2-tools-4.1.1-5.el8.x86_64.rpm
56641449ac2b9486586450eb5edd7ba1e80c42e2b4e327cf92d3225541264148
RLBA-2021:4421
hdparm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hdparm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
hdparm-9.54-4.el8.x86_64.rpm
b697f45bdac88f22ec4926f770a10e09e7283a5c4adfda0c82e083c4ddda2fea
RLSA-2021:4426
Moderate: ncurses security update
The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.
Security Fix(es):
* ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594)
* ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for ncurses.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.
Security Fix(es):
* ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594)
* ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ncurses-6.1-9.20180224.el8.x86_64.rpm
01e479a8932454ca746744cbf6dcf006e48ff702773014a690ee9e56f9a6cf5f
ncurses-base-6.1-9.20180224.el8.noarch.rpm
0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1
ncurses-c++-libs-6.1-9.20180224.el8.x86_64.rpm
6ab0bd138fe730716f2d4c790d1e9249239499b6ec32f2a695f55da3c6430548
ncurses-compat-libs-6.1-9.20180224.el8.x86_64.rpm
66cf17688b5930da19e3a435d23dee553644f0830ed0df61fa26562d5f4b866c
ncurses-devel-6.1-9.20180224.el8.x86_64.rpm
96cd5a3383ee4bec20ec57897de0034734df9356852b8c7c118c10bcdf3f20b1
ncurses-libs-6.1-9.20180224.el8.x86_64.rpm
f127eaa596a0e10a031502ffbe4fec8c80c649c645dca6dbb73109f1e4989df8
ncurses-term-6.1-9.20180224.el8.noarch.rpm
165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066
RLEA-2021:4434
libcap-ng bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libcap-ng-0.7.11-1.el8.x86_64.rpm
761a00cbdad22fc3d308ce6e49aa3b3909cd2a8b93794da53ea74344a280cde5
libcap-ng-devel-0.7.11-1.el8.x86_64.rpm
9351a96d4320814185fb5336a2fe41bfd676f655acdf3aa070c964dd8e74acd0
libcap-ng-python3-0.7.11-1.el8.x86_64.rpm
f6c28c27eb7a3eb39189fe66a67a9ce21fa41c120debd14c887f5226e6546211
libcap-ng-utils-0.7.11-1.el8.x86_64.rpm
e9967d25b3802010113e075ee0b603205fc87d40a2bd6b69faf151adcabe06c4
RLBA-2021:4441
microdnf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
microdnf-3.8.0-2.el8.x86_64.rpm
288566726f311e55eb6b8c7a39d17aed661013737d721c45f7e30f5bc96cf7c3
RLBA-2021:4442
lshw bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lshw.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
lshw-B.02.19.2-6.el8.x86_64.rpm
836ee14696e219b86ab54380c32fcbb7cdc82922ebbd9b59a731feb39fe4d4a0
RLBA-2021:4443
python-cryptography bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-cryptography.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-cryptography-3.2.1-5.el8.x86_64.rpm
fb7a8e1faf38e78cb0f94d07498fa5e7523a97665194d7a10b3ef52cd744ec23
RLBA-2021:4445
fcoe-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fcoe-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
fcoe-utils-1.0.33-4.git848bcc6.el8.x86_64.rpm
a9e9b5a53f45e07d1b13a6e387413acb5cb973aa2cb716377f7966c234a178e3
RLBA-2021:4446
iscsi-initiator-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
8f57c01418ad5e5c667a5c631e78cbcb6ef8f6333b725bce6fd4c3925577d5ba
iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.x86_64.rpm
424ff81a306bf519932fd557edc599a1fff9924068918e26aa3d1a440754874e
python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
cfca39fb448a475d7fd860860691a4ed8974509754f25ffb6bfdca8828230aad
RLBA-2021:4449
openldap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
openldap-2.4.46-18.el8.x86_64.rpm
4ddf1d24486b18daa6b9e2afff10966dc033fba8a08df7714d41d0db5a1f4981
openldap-clients-2.4.46-18.el8.x86_64.rpm
0c3f582752ac772216a51855cfcbd2a18511a2fe5bb69b44c5f2428daf1f26e5
openldap-devel-2.4.46-18.el8.x86_64.rpm
6444c3ce8decbf6e902c02ad8d83c191b6118a4be5f2e7dae6fdbccb384d7654
RLEA-2021:4450
tss2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tss2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tss2-1.6.0-1.el8.x86_64.rpm
c9fc268ee1facd5163bf0daa7a4c7a5ce47d13b073b7a837d301acaa084fcc78
RLSA-2021:4451
Moderate: gnutls and nettle security, bug fix, and enhancement update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
* gnutls: Use after free in client key_share extension (CVE-2021-20231)
* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nettle, gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
* gnutls: Use after free in client key_share extension (CVE-2021-20231)
* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
nettle-3.4.1-7.el8.x86_64.rpm
1c462fc46745eb337edf14bc05b508d7cc5cf109c15d8ec0981ba29b3fba779e
RLBA-2021:4453
adcli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
adcli-0.8.2-12.el8.x86_64.rpm
da4f2cb54f668f1f4cb3683f627574c788a12ab68ab8163abfa719ebe840829b
adcli-doc-0.8.2-12.el8.noarch.rpm
8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39
RLBA-2021:4454
keyutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for keyutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
keyutils-1.5.10-9.el8.x86_64.rpm
28a9cdd2360e30d389fa72f66f073029fd9475b7af4363d8fd0f0e664702ff15
keyutils-libs-1.5.10-9.el8.x86_64.rpm
f44103f68ed2718427d03edb4a0ebdf187ca12bcb13024b9b88a7e7f802ba95c
keyutils-libs-devel-1.5.10-9.el8.x86_64.rpm
fb29a6347fefd64bd276f37a7fd7e6bbea545648f6f07ad15f0acd94e8988b99
RLBA-2021:4456
boom-boot bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for boom-boot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
boom-boot-1.3-2.el8.noarch.rpm
e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06
boom-boot-conf-1.3-2.el8.noarch.rpm
c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b
boom-boot-grub2-1.3-2.el8.noarch.rpm
65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461
python3-boom-1.3-2.el8.noarch.rpm
a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978
RLBA-2021:4461
filesystem bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for filesystem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
filesystem-3.8-6.el8.x86_64.rpm
a620c8dc9acec25088fa83a1061bbda6d391dd1aab36b9eed75144d5d4caf8d7
RLBA-2021:4470
man-db bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for man-db.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
man-db-2.7.6.1-18.el8.x86_64.rpm
8037a0a1e22a3558f4d1ed8d1fff0daba12f79bfb3935885957624e53def1c96
man-db-cron-2.7.6.1-18.el8.noarch.rpm
4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6
RLBA-2021:4475
freeipmi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeipmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
freeipmi-1.6.8-1.el8.x86_64.rpm
b462ee869a627f2e094660fa1acfbc15a2d7de108b72703ba2333163eb01d44a
freeipmi-bmc-watchdog-1.6.8-1.el8.x86_64.rpm
0cd6c7fc163ba44d532f203e63deadfed53b0bd5c36a624c48e12ea000cb7b79
freeipmi-ipmidetectd-1.6.8-1.el8.x86_64.rpm
ea77762191a5170a7626ceaf6bebef127cc350068cfe466784fa54f9da2781fc
freeipmi-ipmiseld-1.6.8-1.el8.x86_64.rpm
5b10807bf9e626ff8edb33bb18942986187ae61fb182d977986f38cdd62bca46
RLBA-2021:4477
parted bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for parted.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
parted-3.2-39.el8.x86_64.rpm
439db5265bdff61a577ba4cb29f729d6abe868cf3b9a77818e38bcf77f1e7bbb
RLBA-2021:4483
OpenIPMI bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for OpenIPMI.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
OpenIPMI-2.0.31-3.el8.x86_64.rpm
905a03c8cbe871b46f09ec36eefa39c8e5ed578379150019b91cc5769f7dd1b8
OpenIPMI-lanserv-2.0.31-3.el8.x86_64.rpm
857b502b8c297df355b755b6cb377f7f67606c9da0cb41efa8f05f8cd739b8dd
OpenIPMI-libs-2.0.31-3.el8.x86_64.rpm
298e426b4ea7ff819988bc6b92f5a3ae4b22b519cdd709e2f6fb3eeec6c6708e
OpenIPMI-perl-2.0.31-3.el8.x86_64.rpm
6bd9f4ae7d4b653181f031438ece41b47e01179470e157f0938b66ee0f10122b
python3-openipmi-2.0.31-3.el8.x86_64.rpm
4bfaa5bcfd1d2071aa57763018f53f4b22a81cb4f1333251ee7d6d34b8ae68ec
RLEA-2021:4488
hwloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
compat-hwloc1-2.2.0-3.el8.x86_64.rpm
4db3b7ecc22503683fbb9c536676c01698c909429d55a05d82db0790066f8964
hwloc-2.2.0-3.el8.x86_64.rpm
47ae43c5691e6c25f41be31d3728ba91b7542fbfa10cf727d583797453b8609a
hwloc-libs-2.2.0-3.el8.x86_64.rpm
5f77d199898d6588e5de9de8330435897cfbeb4bf6d49dcdfc42a5d60f0370f4
RLBA-2021:4496
chkconfig bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chkconfig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
chkconfig-1.19.1-1.el8.x86_64.rpm
effd7e19baa0b24202b93ffa280ebd988f85b6d4defe02dc65741cf796fe2ef9
ntsysv-1.19.1-1.el8.x86_64.rpm
87f06924896c64dd178b8b58614cf539d4c9c07a772adaadc829f0fc55c39a63
RLBA-2021:4501
emacs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
emacs-filesystem-26.1-7.el8.noarch.rpm
0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97
RLBA-2021:4505
mobile-broadband-provider-info bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mobile-broadband-provider-info.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mobile-broadband-provider-info-20210805-1.el8.noarch.rpm
b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87
RLBA-2021:4507
fontconfig bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fontconfig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
fontconfig-2.13.1-4.el8.x86_64.rpm
6f8bbe7f9c22003405031deeb18ef38815d8dd4935b8766f711ac8abff276601
fontconfig-devel-2.13.1-4.el8.x86_64.rpm
9f929477ca4e71bc79eada7ad1582ae756583bc93a71f45530b3bb6c9323b35a
RLBA-2021:4508
lsscsi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lsscsi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
lsscsi-0.32-3.el8.x86_64.rpm
f7e207e75cbba89966d772221f9556d3be6be0c88f9bf0af14454dd882f03c83
RLSA-2021:4510
Low: lua security update
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for lua.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
lua-libs-5.3.4-12.el8.x86_64.rpm
62661a4dd553c29e9200d6319490be62d969c4f4620b9f2134a26652c394fcf7
RLBA-2021:4512
os-prober bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for os-prober.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
os-prober-1.74-9.el8.x86_64.rpm
6fbe666c544e2e3abd3fa5e4e77c8e5e486d7e60f7df881f20c3aeb47114f820
RLSA-2021:4513
Moderate: libsepol security update
The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).
Security Fix(es):
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084)
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085)
* libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086)
* libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libsepol.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).
Security Fix(es):
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084)
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085)
* libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086)
* libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libsepol-2.9-3.el8.x86_64.rpm
cc017c27e60d9f6d83db9d6828cad89b804d9f50476d88b23e0cd7a69b58f107
libsepol-devel-2.9-3.el8.x86_64.rpm
400722a407b15af596c530a7d7f83c429e2577337e56ca93c711ad94ca6155e6
RLBA-2021:4516
usermode bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usermode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
usermode-1.113-2.el8.x86_64.rpm
29b88838a20e0f5fadb80ce7009a9257d3350713139ca34b9d214dc725ae3816
RLSA-2022:0658
Important: cyrus-sasl security update
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cyrus-sasl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
cyrus-sasl-2.1.27-6.el8_5.x86_64.rpm
1824f614aabcebda0254792e6c680f2a333c96393b85d761cf36b5f73cfbd925
cyrus-sasl-devel-2.1.27-6.el8_5.x86_64.rpm
12774e67b410fd7bbc122de9178359e4fed83cc2d8e6c81c0e8e6898e045ee07
cyrus-sasl-gs2-2.1.27-6.el8_5.x86_64.rpm
a9572e38d0da5779a76a655b8dce56eb1d09febdef5568c60ae78f0de939f61c
cyrus-sasl-gssapi-2.1.27-6.el8_5.x86_64.rpm
f1ca7ec9c34e2947a5b8f1a49003e80beed83f009a7171faf3f1ee18dea1ec20
cyrus-sasl-ldap-2.1.27-6.el8_5.x86_64.rpm
cc9470e5fe74e796847de97dc2cbfb3cbc4ef4cc98aacbbaacc47329b9192de8
cyrus-sasl-lib-2.1.27-6.el8_5.x86_64.rpm
b1a98c3128e57243d2ce7212ced1d8676d4196feac16079e6335413a0b57ca41
cyrus-sasl-md5-2.1.27-6.el8_5.x86_64.rpm
8ba490ac54ffd96a57f7bda6801e0920a8ba037d8f031561716a9e27b97e0d58
cyrus-sasl-ntlm-2.1.27-6.el8_5.x86_64.rpm
f0b7feee34ff86b9bf14eeab92bb67eac1a6d46e556b128d024b532ec2cb9a63
cyrus-sasl-plain-2.1.27-6.el8_5.x86_64.rpm
b9e078abe6846f0952cdcfa56d8ca59777c5eedcfb9de265976fca5641917314
cyrus-sasl-scram-2.1.27-6.el8_5.x86_64.rpm
4de03983aa0fa20aa19198fa463e79df8d6e20f5a83468dc4eaeeede24317bf9
RLSA-2022:1537
Important: gzip security update
The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for gzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
gzip-1.9-13.el8_5.x86_64.rpm
722d8e039199d9e37b996c2734a0e0d0f2032a6247616a2f94e8316eec824c53
RLSA-2022:1546
Moderate: polkit security update
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Security Fix(es):
* polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for polkit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Security Fix(es):
* polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
polkit-0.115-13.el8_5.2.x86_64.rpm
abcb39e61f976ae105945d9c4c3a49e47a770f376166b99a4ab62b865b78fd0a
polkit-devel-0.115-13.el8_5.2.x86_64.rpm
95b52462567c23a6fb021dd1270897720fdb969e424003968639e7d3effb22ff
polkit-docs-0.115-13.el8_5.2.noarch.rpm
07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653
polkit-libs-0.115-13.el8_5.2.x86_64.rpm
c05c27b9fe820d2fd9d0f9ebc047255ff79f825af58416538d0fec5e05862377
RLEA-2022:1954
perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2022:1956
perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLSA-2022:1991
Moderate: cpio security update
The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another.
Security Fix(es):
* cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cpio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another.
Security Fix(es):
* cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cpio-2.12-11.el8.x86_64.rpm
af69fa87dc89d44217a405f35f576fc71f60f932ce0b0f99710b743ab5a06e19
RLEA-2022:2014
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libpsm2-11.2.206-1.el8.x86_64.rpm
fd41dd241b6df797440851404cae412b154222804103fcf7d4e0988429ce28a9
libpsm2-compat-11.2.206-1.el8.x86_64.rpm
2b9771d3cc67724a4480c8bed54be247c0dd72440e7d68ad85752518bf504416
perftest-4.5-12.el8.x86_64.rpm
9ed6fb66f98e8716a208a58fc6a7c48cc26acf962319aae6f68e336cd1f4e258
opa-address-resolution-10.11.0.2-1.el8.rocky.x86_64.rpm
6ad3c5b67707090e4c67a945e9fdddffb1e969587d0a9e8ab82fe20703ca43e9
opa-basic-tools-10.11.0.2-1.el8.rocky.x86_64.rpm
596755140a07d757e3eee7a08fc19c314d595621aee00f504bfcf2bfda34aab4
opa-fastfabric-10.11.0.2-1.el8.rocky.x86_64.rpm
9f15a49bc53dfc5fbb77e88c81e7d7791bc49a7d5fbf1484b798f0d292ec1033
opa-libopamgt-10.11.0.2-1.el8.rocky.x86_64.rpm
4385856c1532a15511aa806df87b7af10de2b5a1c852fef51d00d686c5a58f6c
RLBA-2022:2023
net-snmp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
net-snmp-libs-5.8-25.el8.x86_64.rpm
4bfdd28a7b64e67372563781342f9858af6bb96e29a90102d1b6ef855fef7e59
RLBA-2022:2027
json-c bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for json-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
json-c-0.13.1-3.el8.x86_64.rpm
2315a2997fb8083935184ff0ad4bcec36554629d48eacf65f255493227d5d78a
RLEA-2022:2029
libseccomp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libseccomp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libseccomp-2.5.2-1.el8.x86_64.rpm
59a9e248457a1cb695706b17d59bcf7d9bf4e1d84b010c9f309aca2ad9b520a7
RLBA-2022:2041
openhpi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openhpi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
openhpi-3.8.0-10.el8.x86_64.rpm
92bce82eff0c437be15590550995aaaac6dbbcf2d927a743b708231ed7e39bf2
openhpi-libs-3.8.0-10.el8.x86_64.rpm
013d425e3f0a724df07ffa4108518f3e848c71ffd001fea56c1d1a9c3c68752e
RLBA-2022:2044
crypto-policies bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crypto-policies.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm
83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9
crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm
aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183
RLBA-2022:2054
libffi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libffi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libffi-3.1-23.el8.x86_64.rpm
cb6a8d322dc6ffe55e467e38a3d44e36b90a46202cdce0ff5c3b43b571a0435d
libffi-devel-3.1-23.el8.x86_64.rpm
3dc050043ce500c8e2c88c62b114680804074becf8b6762dfa6c740f45ba86db
RLBA-2022:2060
kmod bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kmod-25-19.el8.x86_64.rpm
993d53503b870d0520f04183c8642ba2435fbd78d0dd44fbae4b1d3c05416ef1
kmod-libs-25-19.el8.x86_64.rpm
b89b400448003842e40d7252320ed56d1750d52ae846ac04090169e38fb0f654
RLBA-2022:2062
wpa_supplicant bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wpa_supplicant.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
wpa_supplicant-2.10-1.el8.x86_64.rpm
b977eeb1c8f154074885ef1b0619e78e1c983297a8e4b54f5c9a43c065235cd8
RLBA-2022:2080
sudo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sudo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
sudo-1.8.29-8.el8.x86_64.rpm
f1522f7aa2ff37703c155ad8d9294e852c26b3b7850826c5b425a19005ce003f
RLBA-2022:2098
unzip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
unzip-6.0-46.el8.x86_64.rpm
78baf2fdbfeb4c02602777e90332b30bfb48e5d0ec9909f32636f112e3b387a8
RLBA-2022:2111
ksc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ksc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ksc-1.9-2.el8.noarch.rpm
62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96
RLEA-2022:1869
new module: perl:5.32
This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2022:1955
perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2022:1990
rasdaemon bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
rasdaemon-0.6.1-12.el8.x86_64.rpm
12138e320f634bf5e6e484d88efe399b480d86910cd2afb932d63c4d901a9053
RLBA-2022:1994
libqmi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libqmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libqmi-utils-1.30.2-1.el8.x86_64.rpm
eecd04407c5d1586949310e632fd73d087314f69bc51647feb8e98632456e6f3
libqmi-1.30.2-1.el8.x86_64.rpm
08e634c829db38d7046203c675cbb312cf10d415c307fb25cdb368cfa575a524
RLBA-2022:1996
sed bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sed.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
sed-4.5-5.el8.x86_64.rpm
c2cb6b22bd39a3579cfb66473246c707e3a8e390c76da085ac10102cd4b8d2dc
RLBA-2022:1997
libmbim bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmbim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libmbim-1.26.0-2.el8.x86_64.rpm
f92083fa1b48fe3753fbef2b280efe6446507abf8135d02adef403a53db54b30
libmbim-utils-1.26.0-2.el8.x86_64.rpm
1fb547ae3076fbafb6570f1e86d575da61e2fb6132665ac5e63e6b9989bbb9e9
RLBA-2022:1999
trace-cmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for trace-cmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
trace-cmd-2.7-10.el8.x86_64.rpm
faf2e0428b492c12598c0f6528bd1072645dbb9f6f80b42b8ec48c8b8c3b11e7
RLBA-2022:2009
ModemManager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ModemManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ModemManager-1.18.2-1.el8.x86_64.rpm
2c0e215653ed6a1a318702d5db010edaa432bdd3dc844979482f54d0422f0252
ModemManager-glib-1.18.2-1.el8.x86_64.rpm
27d9fc6e5ebfb8375f67449526d5079da7e1d147f87c16cf2bc283cac45d75cc
RLBA-2022:2015
make bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
make-4.2.1-11.el8.x86_64.rpm
4395686eb6662d9ce01e699cb55f34911f41fe6168437d47dc2c6f7738facb82
make-devel-4.2.1-11.el8.x86_64.rpm
4f67f87f7511d41bbd19656c77a42dc82f3c983194cb29cc230d10a394e83dfb
RLBA-2022:2018
perl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-Errno-1.28-421.el8.x86_64.rpm
cc31824dcec356f8675324cad83e2f265a265c1e2be885cab73159ca09875efe
perl-interpreter-5.26.3-421.el8.x86_64.rpm
bec31df2f08af18c21be0bd60119711e92ad116daa251d14d4945c19649c1a50
perl-IO-1.38-421.el8.x86_64.rpm
bdd888c432876372ed76a6fb19bd6e65585a0be386e6ff3bc39de62b028224e2
perl-IO-Zlib-1.10-421.el8.noarch.rpm
087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25
perl-libs-5.26.3-421.el8.x86_64.rpm
4fe3aa630aa6c83402982a90c8f7373249d1c7566042bd52839855a138c90d1d
perl-macros-5.26.3-421.el8.x86_64.rpm
eafebd6e2eeb0cf52b78a258740686d284a545385477a65decfee06280fdf6c4
perl-Math-Complex-1.59-421.el8.noarch.rpm
8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a
RLBA-2022:2024
ps_mem bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ps_mem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ps_mem-3.6-9.el8.noarch.rpm
056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d
RLSA-2022:2031
Low: libssh security, bug fix, and enhancement update
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651)
Security Fix(es):
* libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651)
Security Fix(es):
* libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libssh-0.9.6-3.el8.x86_64.rpm
edb9aa143d9ce74fde8721bb52d1070cb15624d5dc37d8c4fcb1b3ae79f90cf9
libssh-config-0.9.6-3.el8.noarch.rpm
24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549
RLBA-2022:2034
dmidecode bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dmidecode-3.3-4.el8.x86_64.rpm
869937572d5563035b81c2b8f066a9d95d87c75ef86ccfa0c3c760f517497730
RLBA-2022:2035
libstoragemgmt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libstoragemgmt-1.9.1-3.el8.x86_64.rpm
6e116afef1c670aac97eea6f6e23f462f8fc46a1aeb7ea7e38e881686a9f7cc0
libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm
4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf
libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm
3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559
libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm
d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23
libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm
59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2
libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm
9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb
libstoragemgmt-udev-1.9.1-3.el8.x86_64.rpm
e42d6a4c33400b418ba52191ac5bc83b32f84df1453f0d2d7d8d67c4cdccc42d
python3-libstoragemgmt-1.9.1-3.el8.x86_64.rpm
597dac643cc3f9a8e2bc1ee0abf20d2f51c855be4be37239879428a62b6a981d
RLBA-2022:2040
libuser bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libuser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libuser-0.62-24.el8.x86_64.rpm
0b823bb3ef2134dd65c637f59f19a4450493608944d6a134134d300ca3091518
python3-libuser-0.62-24.el8.x86_64.rpm
6da85d54ab4e8585e00ee6c75aac5c76e11102e1ef661ac2ebcbf91a13c349b0
RLSA-2022:2043
Moderate: c-ares security update
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
c-ares-1.13.0-6.el8.x86_64.rpm
b20639806dc6c4f8e1dfe4a820dc5e23fd7c5dc5219fa081084495a52b7a0be5
c-ares-devel-1.13.0-6.el8.x86_64.rpm
1aa23786260a27810c9036cafaa63db30daf1a6173224e7c62c7187887fe7b87
RLBA-2022:2046
libcomps bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcomps.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libcomps-0.1.18-1.el8.x86_64.rpm
1f30b68b60b65cad2a49710f181f736cf3b430ea77737c7f44bd3a6f871a012c
python3-libcomps-0.1.18-1.el8.x86_64.rpm
370c4134cbb63e2f60d8f893e6f5b432d165efff8d142eaef11d0dfed6410259
RLBA-2022:2061
jansson bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jansson.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
jansson-2.14-1.el8.x86_64.rpm
ec4abca99b96acd29c05cb39c5eb15c7e01827c5e8aeda51f24bc8f93869cd20
RLBA-2022:2064
python-linux-procfs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-linux-procfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-linux-procfs-0.7.0-1.el8.noarch.rpm
4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4
RLBA-2022:2063
firewalld bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
firewalld-0.9.3-13.el8.noarch.rpm
94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8
firewalld-filesystem-0.9.3-13.el8.noarch.rpm
9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0
python3-firewall-0.9.3-13.el8.noarch.rpm
c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5
RLBA-2022:2073
numatop bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numatop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
numatop-2.2-1.el8.x86_64.rpm
27551e647791ad0d2489198c889fbcaf0ac7647cf912e6a9f102f3aa68fedd5e
RLBA-2022:2078
xfsprogs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
xfsprogs-5.0.0-10.el8.x86_64.rpm
7388b2eeaff6394491d86ee0437dee3d5bafba18a1c8a16746fe0fbedfa044a7
xfsprogs-devel-5.0.0-10.el8.x86_64.rpm
cbdba1a641ea361706fd28907e65cf4b332ab79c9e42ebae3f4b3a1e1b29deb0
RLBA-2022:2079
setools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-setools-4.3.0-3.el8.x86_64.rpm
e84dc85b119f8efec0b501e1896cc60034d3bd42cd0ef338e91fc171098d791b
setools-console-4.3.0-3.el8.x86_64.rpm
b7718d0a442b5723a67b843658617260d0aa2e006d025b9b64599384be6c9a12
RLBA-2022:2088
realmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for realmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
realmd-0.16.3-25.el8.x86_64.rpm
be9e94b0434768dbde4ad1b515ac3372f1ad61dba6d72daf933e24608c849f17
RLBA-2022:2089
pcsc-lite bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcsc-lite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
pcsc-lite-1.9.5-1.el8.x86_64.rpm
974a99a1f82e704f3bd74acc31597aab59b4baf577ac26a303809397b0e9d650
pcsc-lite-doc-1.9.5-1.el8.noarch.rpm
45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1
pcsc-lite-libs-1.9.5-1.el8.x86_64.rpm
4aca2f42fc7a5b25551773fd7980a84532f266d78fe51e7d4cf21d679efa7c9c
RLBA-2022:2091
postfix bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postfix.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
postfix-3.5.8-4.el8.x86_64.rpm
f3b882060764a7a390827c851321d15870b7bc5c1e43724c4b88fb821c3e6896
RLBA-2022:2095
python-ethtool bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-ethtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-ethtool-0.14-5.el8.x86_64.rpm
e5ee50deedd5f4b6732eb3c6dc748d53bbc75884113c1d6068a3d64466baf116
RLBA-2022:2097
cryptsetup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cryptsetup-2.3.7-2.el8.x86_64.rpm
b3909ed466ac218d9c4e80570cb4e900d61840f90f9fd6874a3fa0a532064bb0
cryptsetup-libs-2.3.7-2.el8.x86_64.rpm
f461ebe920b723756e580229360ed3f5eef77da45f6c5b817fbd6ef30ab87f35
cryptsetup-reencrypt-2.3.7-2.el8.x86_64.rpm
0ecf9e197e1984baca628627ffcfb00703b5ba704619a1afa38830d6fd375c3d
integritysetup-2.3.7-2.el8.x86_64.rpm
a574990faacfb486ca4e122658fe5f1fbb1a0707bf9cf09b384d8acc6455a289
veritysetup-2.3.7-2.el8.x86_64.rpm
8dd7bd38f9300f6a8c70df10f87094881f64e89b61513106bcb43b7c2cc81577
RLBA-2022:2099
sysfsutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysfsutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libsysfs-2.1.0-25.el8.x86_64.rpm
60f8b824cc526cb9467e6ff2ac668fc69699f47fb864299746ca598c28f6bcc1
RLBA-2022:2101
libnftnl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnftnl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libnftnl-1.1.5-5.el8.x86_64.rpm
6fb0df4498141297072db544857dc8e2602602ddc22bcfd70d4cc7b024954e1e
RLBA-2022:2108
man-pages bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for man-pages.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
man-pages-4.15-7.el8.x86_64.rpm
a35a10d59443e40f372c23080debd9bcba27a121aa0c451269ef90c20ce7c919
RLBA-2022:2114
passwd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for passwd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
passwd-0.80-4.el8.x86_64.rpm
3a1cc71df31d247a8b30cdb8d67fac9662872a18bd2fc35b5e47c19c4d247b6c
RLBA-2022:2115
xfsdump bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
xfsdump-3.1.8-4.el8.x86_64.rpm
9623db8bb5775351203aad158feae2e5d782ae3334b3def7e05aeee0bcd31376
RLBA-2022:2116
iotop bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iotop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iotop-0.6-17.el8.noarch.rpm
d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c
RLBA-2022:2117
gpgme bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gpgme-1.13.1-11.el8.x86_64.rpm
11fdb5b8e04134f2210b500f145045a539cc5ad41c0723d4db6fb4c9c680abcb
gpgmepp-1.13.1-11.el8.x86_64.rpm
d91a46e5c7334733b8f14167f7cdd1ff8134a0fd3fa0714422b0cd3f853eb822
python3-gpg-1.13.1-11.el8.x86_64.rpm
73263b50db0e92731cbde2df8d2f25133768e83cab55ddd3dad553a956f16c14
RLBA-2022:2118
texinfo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for texinfo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
info-6.5-7.el8.x86_64.rpm
c265d03dabac183ae107c4b597a36776ae2a551a55d8a0db360b82e671f415f9
RLBA-2022:2122
gawk bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gawk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gawk-4.2.1-4.el8.x86_64.rpm
d5bccd4f32a6d4f636edbebd6f1b6ca1db6e1f39f64daa86b2420f7d4cfde3db
RLSA-2022:4991
Important: xz security update
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for xz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
xz-5.2.4-4.el8_6.x86_64.rpm
d9d31369563ebeb477fe0d66ebd23afee0699de3e75e36fb818627602bc0aec4
xz-devel-5.2.4-4.el8_6.x86_64.rpm
036eb5ff9a127bec82b64e921acf7652568a9c844280ac383355fef6a9757e39
xz-libs-5.2.4-4.el8_6.x86_64.rpm
283e7ac93ffee0cb93f33a991a9ab9f06a272caf88a6c56d17696ab1b2e83499
RLSA-2022:5095
Important: grub2, mokutil, shim, and shim-unsigned-x64 security update
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733)
* grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695)
* grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696)
* grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697)
* grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734)
* grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735)
* grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736)
* shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for grub2, shim, shim-unsigned-x64, mokutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733)
* grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695)
* grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696)
* grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697)
* grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734)
* grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735)
* grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736)
* shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
shim-ia32-15.6-1.el8.x86_64.rpm
d463aa1e1b24fab05ebe6babdd2cc572fecece224b0c535f8eae3ba4a3ada45a
shim-x64-15.6-1.el8.x86_64.rpm
618ee485a8b845bd9675f29f82889c67de2ed94a000c83a8bbfc32b7ca614fca
RLSA-2022:5311
Moderate: libgcrypt security update
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
Security Fix(es):
* libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libgcrypt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
Security Fix(es):
* libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libgcrypt-1.8.5-7.el8_6.x86_64.rpm
6b782e29090507e3f1fd79353603d52744fc853c3bf73be705ba63172fad0731
libgcrypt-devel-1.8.5-7.el8_6.x86_64.rpm
bb9ae61c1c94686a1b9c2d4d418807366f5ef338294517d9dd5e06576f120a30
RLBA-2022:5322
mtools bug fix and enhancement update
Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks.
Bug Fix(es) and Enhancement(s):
* mtools missing glibc-gconv-extra dependency (BZ#2080999)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mtools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks.
Bug Fix(es) and Enhancement(s):
* mtools missing glibc-gconv-extra dependency (BZ#2080999)
rocky-linux-8-x86-64-baseos-rpms
mtools-4.0.18-15.el8_6.x86_64.rpm
bf5055629fdf5b719b73a142d97ec837af4e244df5f6c3fec9df9bf1a72907cd
RLSA-2022:5809
Moderate: pcre2 security update
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
* pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pcre2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
* pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
pcre2-10.32-3.el8_6.x86_64.rpm
e01ba987cd81213935bca06b96ec8642a6ee178c178a5df8201c8e13f3b1d87b
pcre2-devel-10.32-3.el8_6.x86_64.rpm
d58c0c401b375e10407d9fcbebe8679e80b2516b7f908d6449918b7cb5438a8b
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
c511a9117b37286f7ebd254274183db7767b0236aec16dffbd3f804817e6530e
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
1719080d13216247dae9316172cc19084bc72d380b2200a9ade012c10eb53ab1
RLSA-2022:5813
Moderate: vim security update
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
vim-minimal-8.0.1763-19.el8_6.4.x86_64.rpm
cbb2c73d14f8a9ead6a438911d5475ae09ad25bcb99a24bee8f33d457b6ab4e8
RLBA-2022:5815
bash bug fix and enhancement update
The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux.
Bug Fix(es) and Enhancement(s):
* Segfault in 'buffered_getchar()' function in bash (BZ#2097659)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux.
Bug Fix(es) and Enhancement(s):
* Segfault in 'buffered_getchar()' function in bash (BZ#2097659)
rocky-linux-8-x86-64-baseos-rpms
bash-4.4.20-4.el8_6.x86_64.rpm
75b11d7fde3783e41ec311542b43761cb996fb5f313f9b65c1172623ab66266d
bash-doc-4.4.20-4.el8_6.x86_64.rpm
6833e28d4917f0fe330b2690f14be656d147f359098690d39d00a337430a934d
RLSA-2022:5818
Moderate: openssl security update
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: c_rehash script allows command injection (CVE-2022-1292)
* openssl: the c_rehash script allows command injection (CVE-2022-2068)
* openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: c_rehash script allows command injection (CVE-2022-1292)
* openssl: the c_rehash script allows command injection (CVE-2022-2068)
* openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
openssl-1.1.1k-7.el8_6.x86_64.rpm
117d554d34f3312043180819b4b940fc7b2a4586d550f651877f9c5ff707a567
openssl-devel-1.1.1k-7.el8_6.x86_64.rpm
aacf809def9c0c3c3a6124150db9922568480b8b569653ed69573de7a3a6d362
openssl-libs-1.1.1k-7.el8_6.x86_64.rpm
656d9fbf8647a3114dd94fca70bd29c0ae6b0115ee2536a6240910792ce731f4
openssl-perl-1.1.1k-7.el8_6.x86_64.rpm
01d37726fd1a705f88b69c8d146afedcb644eeffce8b88494d0a0e6d500e2230
RLBA-2022:6459
ca-certificates bug fix and enhancement update
The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).
Bug Fix(es) and Enhancement(s):
* Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189)
* QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462)
* Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463)
* ca-certificates need to add support for signing certs for .NET (BZ#2121485)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ca-certificates.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).
Bug Fix(es) and Enhancement(s):
* Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189)
* QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462)
* Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463)
* ca-certificates need to add support for signing certs for .NET (BZ#2121485)
rocky-linux-8-x86-64-baseos-rpms
ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm
096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1
RLSA-2022:6463
Moderate: gnupg2 security update
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.
Security Fix(es):
* gpg: Signature spoofing via status line injection (CVE-2022-34903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnupg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.
Security Fix(es):
* gpg: Signature spoofing via status line injection (CVE-2022-34903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
gnupg2-2.2.20-3.el8_6.x86_64.rpm
bcc8e48b2526be938285cf48185490822078c65153ada4d81633c83b4d4f9dc2
gnupg2-smime-2.2.20-3.el8_6.x86_64.rpm
48ec6bfa5de6c78331faf4ec66a1beff0141db2415a18fa74260f84d17b73f33
RLSA-2022:7089
Important: libksba security update
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libksba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libksba-1.3.5-8.el8_6.x86_64.rpm
2bd4934389b7e05c708630addefad4016826807e3008dc6398095c54cd7d78e7
RLSA-2022:7105
Moderate: gnutls security update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
gnutls-3.6.16-5.el8_6.x86_64.rpm
fef93f4e79e09dba85e23adf9e2103d8dbee735d0d02bf723d414ff94c5c2a85
RLBA-2022:7107
glib2 bug fix and enhancement update
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es) and Enhancement(s):
* Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es) and Enhancement(s):
* Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615)
rocky-linux-8-x86-64-baseos-rpms
glib2-2.56.4-158.el8_6.1.x86_64.rpm
61a796c05095a0c89ead008de79a522c0d50eff0d5870e7465fced706cf5d10b
glib2-devel-2.56.4-158.el8_6.1.x86_64.rpm
69c0db06fbc8f2d68cd970a4e245dd7a541cdfdd4cf44e68b13b833e207e685c
glib2-fam-2.56.4-158.el8_6.1.x86_64.rpm
4677c25392b7e27e30b0f125f412f6aac4266d9c5abe2ea35c276cd129389ebb
glib2-tests-2.56.4-158.el8_6.1.x86_64.rpm
688e3e378b0c12adbd0b4d5771e65fc15090ca07f6f5a4807e08728d9dea06fa
RLSA-2022:7108
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Out of bounds access during table rename (CVE-2020-35527)
* sqlite: Null pointer derreference in src/select.c (CVE-2020-35525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Out of bounds access during table rename (CVE-2020-35527)
* sqlite: Null pointer derreference in src/select.c (CVE-2020-35525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
sqlite-3.26.0-16.el8_6.x86_64.rpm
d78914d48cdbbd003d8034e9859beaf3d4a3e12039c98eb3e80ed62ae5533e9e
sqlite-devel-3.26.0-16.el8_6.x86_64.rpm
4320f53099ad9c1df90735bd288e271970e41aeaed143e5ebea0d3303c97fed4
sqlite-doc-3.26.0-16.el8_6.noarch.rpm
c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d
sqlite-libs-3.26.0-16.el8_6.x86_64.rpm
3183e68d7b7aac6cd39c3418b628b0d3905f0e25dd61b2637a60d24f16101f6e
RLBA-2022:7115
rpm bug fix and enhancement update
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523)
rocky-linux-8-x86-64-baseos-rpms
python3-rpm-4.14.3-24.el8_7.x86_64.rpm
e1c16b79fce78de0cd225edb18baf4912ae103a4d1e4427ba48545f1e1442b7b
rpm-4.14.3-24.el8_7.x86_64.rpm
52ddb09b53c7fe658f11a5353fc090dace91285ec842e39a64d6e08627b2b278
rpm-apidocs-4.14.3-24.el8_7.noarch.rpm
a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b
rpm-build-libs-4.14.3-24.el8_7.x86_64.rpm
145ebac4456a0cd149537054ea74e323fd9eca548f38a40bd1725ac4eb9fb288
rpm-cron-4.14.3-24.el8_7.noarch.rpm
b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f
rpm-devel-4.14.3-24.el8_7.x86_64.rpm
8be76765b51d8681a9f76b209d07847c27b338fe25af2b0a149502ce5b5424b8
rpm-libs-4.14.3-24.el8_7.x86_64.rpm
fc4263ea61b68b93eda32fcde2612fea4537286f1e7e56fdd94db8eaae7faf8d
rpm-plugin-ima-4.14.3-24.el8_7.x86_64.rpm
e51a248c3608b07034f31451235312ce267e10c465585cbe633f900ddee1b0c8
rpm-plugin-prioreset-4.14.3-24.el8_7.x86_64.rpm
7eef6d9114e98909f304c2283325fc84afa6a3e22c794537eada9d1d164b53ae
rpm-plugin-selinux-4.14.3-24.el8_7.x86_64.rpm
0d071d4c4a26203c48961cbeb02d2b9c5b050e29d31c36cc9e11769c50c9cf85
rpm-plugin-syslog-4.14.3-24.el8_7.x86_64.rpm
2d4cb5df2e4c19d3a4d59100777475e0e94bc1e7ddf0daf1b7c1503765621eb8
rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.x86_64.rpm
ce1d5a7d9e8896e209eafb6142f22feaa70a2745e789a0b303e0dc8741fae778
rpm-sign-4.14.3-24.el8_7.x86_64.rpm
110d95fb5f5bf027f409ebe3ea455c1b3e387cde00645d970f5e716e92861e66
RLBA-2022:7116
libsemanage bug fix and enhancement update
The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.
Bug Fix(es) and Enhancement(s):
* libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.
Bug Fix(es) and Enhancement(s):
* libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139)
rocky-linux-8-x86-64-baseos-rpms
libsemanage-2.9-9.el8.x86_64.rpm
d08e18048af1c5ad125356edc17d805cdac32f33a1db756339d292ae3bc93428
python3-libsemanage-2.9-9.el8.x86_64.rpm
7f7c7f0b08535b082dd4a877324453f56f4f5d977982751e1c0843b41be90af3
RLBA-2022:7404
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
rocky-linux-8-x86-64-baseos-rpms
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
RLBA-2022:7678
kmod-redhat-oracleasm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kmod-redhat-oracleasm-2.0.8-15.el8.x86_64.rpm
44ac298ff3dec860dfc4aec171bcc9773a2e7ccbd205eb52988df8242d048bda
RLBA-2022:7679
mcelog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mcelog-180-0.el8.x86_64.rpm
f327c50b3113ea5afe315a8a2457bbc3693dd30a3637dc2a49b47f267fbfa479
RLBA-2022:7681
audit bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for audit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
audispd-plugins-3.0.7-4.el8.x86_64.rpm
4a01420e794d95d78d1681ee3cc731244d59d05d69bf47c0a00daa885b3703f4
audispd-plugins-zos-3.0.7-4.el8.x86_64.rpm
a2394edcbf95d2127f1719cbaad685f9d60dc61703081bc7678b1afac11ed4cf
audit-3.0.7-4.el8.x86_64.rpm
243ee8b827cde194a4c28936f3cd41ee8f448362a628d72a9265629baf90e80f
audit-libs-3.0.7-4.el8.x86_64.rpm
e804d60f2d5a31e4b10ae0a9a217ea66b7d2bf9e79249085d395d027e502e45e
audit-libs-devel-3.0.7-4.el8.x86_64.rpm
c43ffcb79cf5922fd4c6726c10a2943d16d736e590f27a3337acc933f815cbde
python3-audit-3.0.7-4.el8.x86_64.rpm
53abac1b0e86b1a61dbce1e01aab3e25161e61682f2bcf0361834594b3da6009
RLBA-2022:7682
babeltrace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for babeltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libbabeltrace-1.5.4-4.el8.x86_64.rpm
9e6e4064fb82bb163daeb5f230c4fd92917ba94d6e93fc366e769e7a7844e7ac
RLSA-2022:7683
Moderate: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
* race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)
* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
* memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)
* smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168)
* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)
* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
* buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
* use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938)
* net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
* Spectre-BHB (CVE-2022-23960)
* Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* memory leak in drivers/hid/hid-elo.c (CVE-2022-27950)
* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
* use after free in SUNRPC subsystem (CVE-2022-28893)
* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
* race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)
* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
* memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)
* smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168)
* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)
* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
* buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
* use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938)
* net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
* Spectre-BHB (CVE-2022-23960)
* Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* memory leak in drivers/hid/hid-elo.c (CVE-2022-27950)
* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
* use after free in SUNRPC subsystem (CVE-2022-28893)
* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-425.3.1.el8.x86_64.rpm
916f29290aa962dcb1cc0b509124b99e65808b6be88686ccbb3f42d082a953e9
kernel-4.18.0-425.3.1.el8.x86_64.rpm
2d1a07f77e08aa7ddcaf1244679c247666ba718cdb7dc5c612334b7868270d73
kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm
7502d39b6c6a1298db08b7e84273413b6cbe84299fd31cb2266e8d6711947bd9
kernel-core-4.18.0-425.3.1.el8.x86_64.rpm
4dad88a5fe11b6047eaf9df8654e981009add3a37ce5856c05fbaabb35ca2c6c
kernel-cross-headers-4.18.0-425.3.1.el8.x86_64.rpm
c7815511a07781124bdc76d483637d89fb66718b08fc66e0f861e4344c7c9de9
kernel-debug-4.18.0-425.3.1.el8.x86_64.rpm
d466f697683b314f994d629ee2b45a9247d4591fca2429e599a8d78a9446d739
kernel-debug-core-4.18.0-425.3.1.el8.x86_64.rpm
422c13c018c3bfa6a871dbda188318e5fce776c1e4e081cd206393759474f7ca
kernel-debug-devel-4.18.0-425.3.1.el8.x86_64.rpm
b52028e57ae4b54af1cae536e844abc901f8ff7f4d96d4bde97798029e429bc4
kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64.rpm
308630b40996f4d9e7341c06eb1290af50ec0140ddfea07faf33a9ceebb81c8e
kernel-debug-modules-4.18.0-425.3.1.el8.x86_64.rpm
13be95f8208e7b59876913fb9d3dcb622edb58d0b31fc873961499f0c7cd9c33
kernel-debug-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm
fa5bc1ba0c1901232f912de3daf90213218251403024dee91fd7a353c987d2fe
kernel-devel-4.18.0-425.3.1.el8.x86_64.rpm
942c23ac86e1284d69eb39639fb308a64859f479b6dac2df5ef48dc572bb2dd4
kernel-doc-4.18.0-425.3.1.el8.noarch.rpm
dfd007ce8dc51176e8566453017d2319a2430dfea645a11ecddbfbf2d299aea0
kernel-headers-4.18.0-425.3.1.el8.x86_64.rpm
dd41b9c3e90de98dd8775acceb96a13fcec98bfd00e9df9b67cf423d65ad8f0a
kernel-modules-4.18.0-425.3.1.el8.x86_64.rpm
2776fb3ef33a3ca2976e27dfddc221f5c2ceb8b60dbb4cfb9569b5647e66fe80
kernel-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm
d77c58049f6fef4a25e139e81f7eb12d8c1c076c592a7190d74e8a0f2f25d6bc
kernel-tools-4.18.0-425.3.1.el8.x86_64.rpm
1b37dae1170690f617d0d8472d85d65ef1295b7f9b43a564e218a86de1475fba
kernel-tools-libs-4.18.0-425.3.1.el8.x86_64.rpm
721a901d11711151aa87386b2f5fed06216b633e7dfd81782771b2608421309c
perf-4.18.0-425.3.1.el8.x86_64.rpm
55cffef3484b3007e968bb294b6ca624c317c285fbd91d3d926ea094c136ecf2
python3-perf-4.18.0-425.3.1.el8.x86_64.rpm
3239cbb0136bf0cfc6d5b76ceae67864185eb63ac81a8ee924694348d7115b70
RLBA-2022:7684
glibc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
glibc-2.28-211.el8.x86_64.rpm
eaf25c824ccbf483d8e4c490eabd5036e7bcf578282071be8b03326291bd69e0
glibc-all-langpacks-2.28-211.el8.x86_64.rpm
137b9be34b103ac1b1a700dccb465e8662cddd6a4462264bae479b6beb0f7216
glibc-common-2.28-211.el8.x86_64.rpm
6825067b69302b5fe97e70fb65e049a24633790e5e02bb995a8825b06fa65904
glibc-devel-2.28-211.el8.x86_64.rpm
cfd4273bccbdc53553c2d235e665034334a33c6e140c17f307f1ff2a721fdc50
glibc-doc-2.28-211.el8.noarch.rpm
651c1bcdd3292c68b98e3f102ea239fa39a639f17539d011589a2ca80621ddbf
glibc-gconv-extra-2.28-211.el8.x86_64.rpm
644e6172587c73c2f7c4ecb2b28cf13035b5c3fb209938d6cc8d1a451813a85b
glibc-headers-2.28-211.el8.x86_64.rpm
f5c8a809fae56c8cb5c5e8cadc8c1bbd41cc89c85d8e6725688443a61929a0d6
glibc-langpack-aa-2.28-211.el8.x86_64.rpm
8ab1745b0c2762a7b4d12345c35509c4ef8411276c6a78e1ed6225859d235eb4
glibc-langpack-af-2.28-211.el8.x86_64.rpm
41d63a4083a3a886ee284de05e4d50a1db09bc70ceca4de21686ead011de7aa6
glibc-langpack-agr-2.28-211.el8.x86_64.rpm
f81ef5f6249cb748cfed19b63db6a952d4dfec7119ae7625558ded475a776359
glibc-langpack-ak-2.28-211.el8.x86_64.rpm
0850181093442cb5821feca12aae344067ad69318ba4f07cae5121bec22e17a0
glibc-langpack-am-2.28-211.el8.x86_64.rpm
e49036676b20fe4e1370025144c1a1e7bb6fc58bffd8e1f23c6744191b04c59a
glibc-langpack-an-2.28-211.el8.x86_64.rpm
1b29b1b7ffe007dbf548f973e2fba5ca9a03e7ebc8756f92e09eca95d49f857d
glibc-langpack-anp-2.28-211.el8.x86_64.rpm
4f973788cfd6da0309cbdb44a0000b18f50bfe65161d8a352de9cce118715765
glibc-langpack-ar-2.28-211.el8.x86_64.rpm
1420e819195fb7f542f9302752d8c6142ec1a2aa99574fbfdfd016914d0fc9fe
glibc-langpack-as-2.28-211.el8.x86_64.rpm
1ea8969e7dd29ba5960e68296fb816fae2480c5b7f6a4cff1815e17ff0d380cf
glibc-langpack-ast-2.28-211.el8.x86_64.rpm
c7b85acfc9349d1afbb0249847997197899cbd70e1b55ab790556030a694c7f7
glibc-langpack-ayc-2.28-211.el8.x86_64.rpm
143efe8e2217a8de2fed884baa95a5ddadc60406cb98ef17094f4e38b5860546
glibc-langpack-az-2.28-211.el8.x86_64.rpm
b82545b11c2525da4ad815765ac0bbac3bf3c68c98d6f0d1069cd2464c5039a0
glibc-langpack-be-2.28-211.el8.x86_64.rpm
bdd7e7ddb5c41a4b78c3882565b67a62b407c21dd18039c4bd58109f1facbb27
glibc-langpack-bem-2.28-211.el8.x86_64.rpm
97fd21bd5aa8fba4d7580b22c55f85dfb20acca7bf410ff280630da940215165
glibc-langpack-ber-2.28-211.el8.x86_64.rpm
4f359a758fba84b5bddf069f2a4c71124c8160c8ae7110f1d4525b4e934a4bb1
glibc-langpack-bg-2.28-211.el8.x86_64.rpm
b76b3a54160736d2389cb62d2b8ab8cc06e7cd6ab90fa048e31d666e840294b5
glibc-langpack-bhb-2.28-211.el8.x86_64.rpm
931466a47fa50267652f19679102a4be4b1a4822d311dfadd31425a416fce07e
glibc-langpack-bho-2.28-211.el8.x86_64.rpm
72338c9dc1abbb9d4d61f383e3754fbcc2a5b1a47425899fc15b72661cf4a0f4
glibc-langpack-bi-2.28-211.el8.x86_64.rpm
3e997dcdb6aae046c5ca5839f0316de421113312e067098a2b1ccf8cbfeef33a
glibc-langpack-bn-2.28-211.el8.x86_64.rpm
670a2747b6aa8d29110deb029898ba5381b73302290efd1fa55685b984d031f2
glibc-langpack-bo-2.28-211.el8.x86_64.rpm
0485d5cc16a84df1fe80c34bef474377e78c5bbc1e6dfd0982133cd61f5ff89f
glibc-langpack-br-2.28-211.el8.x86_64.rpm
32f5b8d849c07c49b889ddd71368d222cc2b581903d8b4db19e1f030a888bb52
glibc-langpack-brx-2.28-211.el8.x86_64.rpm
0308fa50f63d264a48d60b6d84313d0a67c38bc9ecf0360b48a93fe31e55db98
glibc-langpack-bs-2.28-211.el8.x86_64.rpm
0b931f490c7cb0575b0d21ec569c780322594e7c99f6fba5846a8b84977a608d
glibc-langpack-byn-2.28-211.el8.x86_64.rpm
da93fe0abeec6720f4c25a56ed9281908c56a0495a540a1df1b00538aa243370
glibc-langpack-ca-2.28-211.el8.x86_64.rpm
f4566fb3524661d98ac360a7a4e52f180c5d4a0c9d0c7f613bcc21583d621bd8
glibc-langpack-ce-2.28-211.el8.x86_64.rpm
469ad495db0ff3e8b557f33f6ba5bf5a0f98cd4f0f5fa48afa9b6a2a0dde135d
glibc-langpack-chr-2.28-211.el8.x86_64.rpm
4e5ff4cd1a6e99dd6abe56bbcfb157c7a89e9f312bb3804f12063b7b9dc0959e
glibc-langpack-cmn-2.28-211.el8.x86_64.rpm
a2801823d4bd2b4abe9c8b450e375aa9fe2426e52fde0d8e6fce53c88f2b8fdf
glibc-langpack-crh-2.28-211.el8.x86_64.rpm
d13e79283ec1201a6d0406a3f8483643f388f3948f2cfd4b7329119b7e1b7a97
glibc-langpack-cs-2.28-211.el8.x86_64.rpm
b7822706b092858468762d88ecb84b83d91ee9e86d6da0090966bb5a06d680af
glibc-langpack-csb-2.28-211.el8.x86_64.rpm
7768a796132318f5b4a1b869902870e01456e4ef2631b5687e300de656610c68
glibc-langpack-cv-2.28-211.el8.x86_64.rpm
7fba9954d28f5385cc38f6f0a1be3231cd55e6a553399ac1df1701791cd40707
glibc-langpack-cy-2.28-211.el8.x86_64.rpm
384bc757e55b803d8fc5fb784a87e6faa8435a00e6182c45184c4b38ba76e1ba
glibc-langpack-da-2.28-211.el8.x86_64.rpm
d89bde235199610fd23a9abbf2f59315de6c0f3a58fee9e9ec14bd80922afcb8
glibc-langpack-de-2.28-211.el8.x86_64.rpm
67ea4a7d17e3abc4b38a70edc9229c710c4c33443d82eeba7d87f8997ce215fe
glibc-langpack-doi-2.28-211.el8.x86_64.rpm
2009df86b46b62139784c4633359811991cf5e29aab9325399d909b59d5516e8
glibc-langpack-dsb-2.28-211.el8.x86_64.rpm
1271f1a00bcd0363dda350d5c967f7c29a0483b144f154ea104b6bc3f0905e85
glibc-langpack-dv-2.28-211.el8.x86_64.rpm
a4d165798cf42daf8a57663e757bb799f5cccc26c6b62621c5dba75eae446e2d
glibc-langpack-dz-2.28-211.el8.x86_64.rpm
2c5dcb7ca78a91fe2f624277bcd203ddb0c24a0d01127e5037d72c0df7eda062
glibc-langpack-el-2.28-211.el8.x86_64.rpm
7d6fdb12f5c0d6d0a15184a9ba7ddac3ed9e5ff94e70b315267022a58ce00169
glibc-langpack-en-2.28-211.el8.x86_64.rpm
2ff8de02028dc59495a8fd5c5b5349ebc333cbd48878a79d73f9dcf4ccb56802
glibc-langpack-eo-2.28-211.el8.x86_64.rpm
2b35097ebf19ddb3559b2b93b896b5c93d43b64dcb479520be3d341a13d32e1b
glibc-langpack-es-2.28-211.el8.x86_64.rpm
bbfdc1be0c4c0dcb6c1562c2862af564b626f60c9f4a76ee5ec382a35bb7acbf
glibc-langpack-et-2.28-211.el8.x86_64.rpm
7b7a337111227bb86292e419718b5f928a2ef330c91aa5f1770fe38e35d3687b
glibc-langpack-eu-2.28-211.el8.x86_64.rpm
1808a8cea053b3ebfbd5ccbb8f6534ec0af13f875c27438be0aa097bfce9820b
glibc-langpack-fa-2.28-211.el8.x86_64.rpm
4da60699f2db283a22d7bf6037763d6c936ad01a7593704bd0a70256ee0edd98
glibc-langpack-ff-2.28-211.el8.x86_64.rpm
798f8bcea6e3cbe87d86ea4459d8aa784718ff834810dc2ee6eda593b2190076
glibc-langpack-fi-2.28-211.el8.x86_64.rpm
cf88a82019ea2ccfd18f1629f1537b690e6f5bf62e8e688f5f194e48df24828e
glibc-langpack-fil-2.28-211.el8.x86_64.rpm
b6e395886fea8d3e13c6a6a247bfd5f31f96edebf5a51da17ff0073e52ae1d78
glibc-langpack-fo-2.28-211.el8.x86_64.rpm
df1f04db471a21757febd14ebb84902af1b84a292c06c1b346b2cff93bda87d4
glibc-langpack-fr-2.28-211.el8.x86_64.rpm
01b5519982ecf17ec6f3fdd7c226cf144dc349522f199ab9781b347bbf8fd3af
glibc-langpack-fur-2.28-211.el8.x86_64.rpm
435a9be7bb57f55fe8e6a5750053f5bcd75f5df7b538c1406578b4cd9788a17e
glibc-langpack-fy-2.28-211.el8.x86_64.rpm
6cd3adae8c308f2592bc0efff34c505090cedc3202e99bbe6ef5c5b5459b9555
glibc-langpack-ga-2.28-211.el8.x86_64.rpm
7442b1fa932383dbc1ca5e3795dc507b3c59c1fbefac4e10bb80535f6ea73167
glibc-langpack-gd-2.28-211.el8.x86_64.rpm
cb09b26abbe240f6293a7f3ec9b3dcb88595991048cc5bfd1a8a6e8435b45ea4
glibc-langpack-gez-2.28-211.el8.x86_64.rpm
994273240ba0d9c4602f30990e86394d3776ff102efb23d2bd7c1fa094fd7f95
glibc-langpack-gl-2.28-211.el8.x86_64.rpm
e9dab212d0e5fdefa73b29406167cfd715c2b85805949086f455ac7345cc586d
glibc-langpack-gu-2.28-211.el8.x86_64.rpm
c49ec2b0361bdf485a8d5367fbca83d1258ae8ab31c312bc0ccb1de298b248a4
glibc-langpack-gv-2.28-211.el8.x86_64.rpm
61336102ad654478038dbb637a29912cff8b7254aaa35aeb314a0c9db8447607
glibc-langpack-ha-2.28-211.el8.x86_64.rpm
326660083fc1b39786fd003cc3dd77bd406c9493aa2ed356188068b59e1d2acf
glibc-langpack-hak-2.28-211.el8.x86_64.rpm
677d4e9e60d7728d1e84a459d914cd2ef89da40455e44a1fba4f408866a38095
glibc-langpack-he-2.28-211.el8.x86_64.rpm
387a9717422d05019bc0b5129ad07c145a9274042acd9263ccfb112bf9d00919
glibc-langpack-hi-2.28-211.el8.x86_64.rpm
76ffb9e3085e4a1ef4b663ccf6728da056c261c71974f5da765ee2c50a2d633b
glibc-langpack-hif-2.28-211.el8.x86_64.rpm
4cfd1a5f5c168d2c9ba3f3cb51819e226d38d4214fe5306bb9bea0b215e92d40
glibc-langpack-hne-2.28-211.el8.x86_64.rpm
1f13cc96641c68129dec43a58fd3adc68d9d9dd7fa1ad2e733fcc29450f1af1f
glibc-langpack-hr-2.28-211.el8.x86_64.rpm
8e09bf597d9bc0881d981597cad7ebe08ce7e2d789068947eb713040493e4290
glibc-langpack-hsb-2.28-211.el8.x86_64.rpm
7861f83b38eb49bbe9f62780d821a757cd2e568c483b546ff393bdafdb79c6d5
glibc-langpack-ht-2.28-211.el8.x86_64.rpm
88ba5b03f3e1d0aeaef8f515767e78561f004ac8a2031f984c3fae4695997d8f
glibc-langpack-hu-2.28-211.el8.x86_64.rpm
2724e22897129d5ea299ee815833e9095440be5c316b7ab9c60c38753c21d509
glibc-langpack-hy-2.28-211.el8.x86_64.rpm
23179bca9dac9496d9e77d6355358d3ffbb3fead402a8ee719d71058b184e3ca
glibc-langpack-ia-2.28-211.el8.x86_64.rpm
800b928dd4d8a3555a014849eb7dac68a648702e0d04805ef240358b0b0edb73
glibc-langpack-id-2.28-211.el8.x86_64.rpm
49b56dde6f267e7b7b665bf9cf66593ae2dca1a8d863a50ae215f5c20ce13ad1
glibc-langpack-ig-2.28-211.el8.x86_64.rpm
606be40dd87cc52b8ccd21d846dc00eab87ecca0e16bd3e3b5b4758949398e63
glibc-langpack-ik-2.28-211.el8.x86_64.rpm
396899da94cd03fc4bd8602fd043b3e6f6c79663125abbd853c2c90bc8235600
glibc-langpack-is-2.28-211.el8.x86_64.rpm
a1df07a7034c4f8d821496b05c8deb75a766cb1a9dfc8256e3add6993ede11ac
glibc-langpack-it-2.28-211.el8.x86_64.rpm
8d2ad64b6e5350546ed8dd36c857f59d229d84074e4101862a79c9093b194ca9
glibc-langpack-iu-2.28-211.el8.x86_64.rpm
9bb0a00f80e0494ed6e7445fe9ed56802171c1477e79e5acf32ba9d7c6a3cca4
glibc-langpack-ja-2.28-211.el8.x86_64.rpm
55e30ee8ba17f71606179566606509398c8b91fc56118b2de4cc12a5dc9c3f9f
glibc-langpack-ka-2.28-211.el8.x86_64.rpm
13c202242a745399afda180072003d85dee394e265fe7530067b38a9d3f6ada6
glibc-langpack-kab-2.28-211.el8.x86_64.rpm
2760580710e016416f6d348116b71a6e8161c5c0aa7b96235232ef2964381688
glibc-langpack-kk-2.28-211.el8.x86_64.rpm
457bd3328502f9e5027b9707f8a812ca017ce1a17c2183504f6f9af1641ebafc
glibc-langpack-kl-2.28-211.el8.x86_64.rpm
123cea29f35230b0c08e24995e96a7b2b56a6db84282c09d54d0dc63e16b01db
glibc-langpack-km-2.28-211.el8.x86_64.rpm
139a960587ea478f958d6b5b98a04e4a278e06628fb0f15339ba645d754cf0f8
glibc-langpack-kn-2.28-211.el8.x86_64.rpm
3fc816cde5f0e228e06161e35072c4514195c71130000d16c991ab6c848d65ac
glibc-langpack-ko-2.28-211.el8.x86_64.rpm
8485d4c74a242d25fcce0c3caacbc1246e47feb73af2845ca2181d47cff1639d
glibc-langpack-kok-2.28-211.el8.x86_64.rpm
3d65bfc8a51546cca7a012b6a775caf8840e7c103ac8f14ba8dd441fe55af230
glibc-langpack-ks-2.28-211.el8.x86_64.rpm
4c9f5459ccf9514ff1f8cf01b4d1306234593bf08ae6eabb884a898fdcdecb0b
glibc-langpack-ku-2.28-211.el8.x86_64.rpm
271a7f2ab0418a528ac59daf3006a9c54b2d4ba1f69c28a3c1bd8b88fc7a5981
glibc-langpack-kw-2.28-211.el8.x86_64.rpm
2e036a8ef9156d0e80905589bf32aacb13fbf431a8bc2f12acf0cbeb006ff5ae
glibc-langpack-ky-2.28-211.el8.x86_64.rpm
f921cd1c29ea1fba674af84c8da94d45226725c208460171619cd6c8676d0ae7
glibc-langpack-lb-2.28-211.el8.x86_64.rpm
013224c8ffc9f8e72b97dd70f1d899b191d2394e31d12e153094bff9b8e77c9c
glibc-langpack-lg-2.28-211.el8.x86_64.rpm
6538df78b8b0287b364a6c90ea6ea8d2f2ead13ee28028990428b52c79feef48
glibc-langpack-li-2.28-211.el8.x86_64.rpm
680f0372bae3869ca4803d421a7d13fc77d95dba4f540db8f078622575248d97
glibc-langpack-lij-2.28-211.el8.x86_64.rpm
c323cebfca86323dc25c7030f006b5210f208b6dff04e7f805fd0ea043f1169b
glibc-langpack-ln-2.28-211.el8.x86_64.rpm
00b43444d9534ab752203f57450e8f1654b4f0807aae8d9a825d506848d11ff6
glibc-langpack-lo-2.28-211.el8.x86_64.rpm
758b385a6a2dda07a7635b25c5c7da907cfdceacc124e86e5aa126b6fb57ee20
glibc-langpack-lt-2.28-211.el8.x86_64.rpm
cd85c448d4225fc9db8b679af51a641b5744ecea2ee75d40ba9ec6e9c03426db
glibc-langpack-lv-2.28-211.el8.x86_64.rpm
0351a63dc04ae6aed1f2998a289eef917f6b82ff10c59de17bfa3c9ac1e6e34a
glibc-langpack-lzh-2.28-211.el8.x86_64.rpm
189494caab9142abbe97852905b3878d7832d402c85cd9f3604bf40ebe2d762c
glibc-langpack-mag-2.28-211.el8.x86_64.rpm
ceb853972fdfe2b537a3bd6384d252a65349dbcb16e72461cbc9c0ffb91ac659
glibc-langpack-mai-2.28-211.el8.x86_64.rpm
0f7df04d99410b50d68d916c956b74649bcd215fb1f7a487c2262ca321d5efa9
glibc-langpack-mfe-2.28-211.el8.x86_64.rpm
c01e18c8805d9ecc2996f2cf4391ff3f357eda6d85c44b282492d8e5119e764f
glibc-langpack-mg-2.28-211.el8.x86_64.rpm
82dd8389732e1d4f501759f8c87f63ee2afc428f8865cfbd0d79f4aa58370a66
glibc-langpack-mhr-2.28-211.el8.x86_64.rpm
743daf561935fe23a89b706e44816ee49190289ffd26ede64e6a4e40ee2a2a32
glibc-langpack-mi-2.28-211.el8.x86_64.rpm
25f57807ae2e6cdda342b46cdd29542d639e020ea44e1259b4d9d54a0abf484c
glibc-langpack-miq-2.28-211.el8.x86_64.rpm
b96b112dd67c3c24b31e28bdae3eefcc8b62a80c11160eaadd1223de6b44a98a
glibc-langpack-mjw-2.28-211.el8.x86_64.rpm
78b9aed5672b09b2ae6d346ec790a2b54054be0d35fba229da65ebaef5c1c2b2
glibc-langpack-mk-2.28-211.el8.x86_64.rpm
41d389876ac6c627fdafd4b7ce654170248e6615d20de6bd9433ba50b788ea8e
glibc-langpack-ml-2.28-211.el8.x86_64.rpm
a153adeb6aa15344e9196d8824c94d208095716df617b8ae889e97248e19d699
glibc-langpack-mn-2.28-211.el8.x86_64.rpm
5a821c9b241a91c9b7508513d4c90518620086965d79ed9cd4d3aba707bfdc1a
glibc-langpack-mni-2.28-211.el8.x86_64.rpm
9b92cc461fa01b0e9d29073cfa3de3b54600aeb521846be05c0f4cfae3c97a4f
glibc-langpack-mr-2.28-211.el8.x86_64.rpm
411c4ab9ccbfb76c8342b2c2ebc6de6eb1f897fa65a140332496483c641ddb4c
glibc-langpack-ms-2.28-211.el8.x86_64.rpm
34374e7939288fdc197b1d363c77894b8547ae824a425619e6e0d9a065999235
glibc-langpack-mt-2.28-211.el8.x86_64.rpm
0980e1a2fa042a8e6b244d463570658d615bd6be87c2f6f9a8f2c5f780a14a21
glibc-langpack-my-2.28-211.el8.x86_64.rpm
b52dad4c0746e0018af5e20160b7463ae487f7b8e9fdbe98cd9a209549a3ca5b
glibc-langpack-nan-2.28-211.el8.x86_64.rpm
a43fda466eedce6e326f2e6698916997690467b0198c3ce6de37e0fb1bf0686c
glibc-langpack-nb-2.28-211.el8.x86_64.rpm
be44930889608f24aa716423dcba128041305dd16a74d5f58d09420d8c26e57e
glibc-langpack-nds-2.28-211.el8.x86_64.rpm
20e88af4d21b4345bfe88f6e7e854f69af92852f2113090b58e30e1e08f73dff
glibc-langpack-ne-2.28-211.el8.x86_64.rpm
360015bca371087c8fe71133a837c7fd9a30254c3c0613ba2e4173ba0245b944
glibc-langpack-nhn-2.28-211.el8.x86_64.rpm
cbc943ae41621a39f72604e4cc698ad20e19c80cfc2a37a5a68459f349dfbbd0
glibc-langpack-niu-2.28-211.el8.x86_64.rpm
912db2618c9b2ede004293087307ae8a515457dea0cd4ecd0f10525efd2505c9
glibc-langpack-nl-2.28-211.el8.x86_64.rpm
e49ffeee574c41336ed4bc227fbb3281ee0c613584520cdfee99ffe0dbcd3c92
glibc-langpack-nn-2.28-211.el8.x86_64.rpm
38cc820d8d84794333b96b804606459c615fe77ad945b4e355b3cd4e00bd67db
glibc-langpack-nr-2.28-211.el8.x86_64.rpm
2b9500454ea68fad039dd16251174c6d402adac8bb174f227870d2e8e23095cb
glibc-langpack-nso-2.28-211.el8.x86_64.rpm
6f74f92eedb92bef6d7a6c814b103c14ae701c68674c21d8a9519e5b5cd3d984
glibc-langpack-oc-2.28-211.el8.x86_64.rpm
540d27004972bc328fc2e06e95d6a862048eedd3de6b9d3516a50fb104ead2e7
glibc-langpack-om-2.28-211.el8.x86_64.rpm
e27ee5282111d2b88c916320c04d16b91a75246af83545b2964762f0881b6e22
glibc-langpack-or-2.28-211.el8.x86_64.rpm
8b739ae556e1385151ce80dd49fb46da31a6ac07475a3bb27ffcdf1df2833976
glibc-langpack-os-2.28-211.el8.x86_64.rpm
6c262e93f8e30c1e4708b69f30160b4371828d075d59a3579464660044a9543c
glibc-langpack-pa-2.28-211.el8.x86_64.rpm
3703353a6ffad9cf46ebb169a1c279b241198b04b94c3ecebf20d03d77a4fb47
glibc-langpack-pap-2.28-211.el8.x86_64.rpm
c5241ee5bec2f0939d89e97e1235da830872c5f65335d9331fbd5e70bf2dc36f
glibc-langpack-pl-2.28-211.el8.x86_64.rpm
947b668d61656552e8e453b9a0d5d3fe6fff2c4bd55ceb088d4f1d3b1332c265
glibc-langpack-ps-2.28-211.el8.x86_64.rpm
c28a24d68dfbd9e6b7ce832d9ada4a27a830c164af7753a546e244b2300a2571
glibc-langpack-pt-2.28-211.el8.x86_64.rpm
fb76f05550ed367221e194aa080e694de437a41b051c0efd717afbcfb7cb77b6
glibc-langpack-quz-2.28-211.el8.x86_64.rpm
f661e2effe803c7b961f3f9dde1d540f0d43324707eae76c76a79bb8cb142c22
glibc-langpack-raj-2.28-211.el8.x86_64.rpm
21a6087a63e4fafdbea986e918729a1e18f0470dc42bd93ec7f9c1c5eca010c3
glibc-langpack-ro-2.28-211.el8.x86_64.rpm
d73e9cc46fd0b568c30579e7b2b5814f8ce59a868d9d29416d5a656646231965
glibc-langpack-ru-2.28-211.el8.x86_64.rpm
5cee3b18ed551ae56b514bea815e09e01e9ff46c2ec595f8b1adc7ffac4869fb
glibc-langpack-rw-2.28-211.el8.x86_64.rpm
32b494030d7c97861c648a10e44573cdc63ee75c03b889e295930590650b633c
glibc-langpack-sa-2.28-211.el8.x86_64.rpm
371f7ff96c32a6241704f85e4e29820140654ea2887f4b6fc083b4b9bdbb9a1e
glibc-langpack-sah-2.28-211.el8.x86_64.rpm
d6f10a6efc208262e99903af229306d47101a2503cf1addc3f7aab0871023980
glibc-langpack-sat-2.28-211.el8.x86_64.rpm
d0f06bde0c9ef3388d006d953f567b146e22256eaa196e6accc4701545b8eb31
glibc-langpack-sc-2.28-211.el8.x86_64.rpm
bc02360eabef233d3858b9cc8cd15978a7df5940eed638a1a5bee0200d6c01c3
glibc-langpack-sd-2.28-211.el8.x86_64.rpm
6a042b20ca73d21e4fc37ea33087d0849699de7e81f37ad6b9566332c113277a
glibc-langpack-se-2.28-211.el8.x86_64.rpm
2c5f3a9075b9e4c8317d67218affae817ca0d07eb7863b26862d9632bb71cb17
glibc-langpack-sgs-2.28-211.el8.x86_64.rpm
338be78ffb73523c6ed2d29ec1e0c4403dabb80e4062be593ff46205c49f5be5
glibc-langpack-shn-2.28-211.el8.x86_64.rpm
06f416eefaf81a2a43d6264057482b3de8ae1667431ef5eaa73995a6b91417ca
glibc-langpack-shs-2.28-211.el8.x86_64.rpm
65880c4d86486e3c4e4cd3a8c648b239bf08d5c766f7949460e5a7a6048eea3f
glibc-langpack-si-2.28-211.el8.x86_64.rpm
cab63a618533c0dc012966ac8386bf8b612269904e36023d8dfd75169fc553ed
glibc-langpack-sid-2.28-211.el8.x86_64.rpm
368aa35c7a1afdb1af851544e6c7e527c713dd01331de1c2b003577cf712c8e4
glibc-langpack-sk-2.28-211.el8.x86_64.rpm
b78ae9a9961f5cd593edce5b2f8ccf6602cde7d8f9a65685ce51b94320a04b03
glibc-langpack-sl-2.28-211.el8.x86_64.rpm
1a29dc1c26a304d5e5100e511b8a4cf6f362c6478acbd426afdc993759200a3d
glibc-langpack-sm-2.28-211.el8.x86_64.rpm
5ad6aed336a39f4f9d430e12fb1194a888f33b19c7e2a0738ee390f7bcd1220a
glibc-langpack-so-2.28-211.el8.x86_64.rpm
e98f301170dfa5c214df1166f91b1e2aa0ef5928a26f9aed124b64bab507a1ef
glibc-langpack-sq-2.28-211.el8.x86_64.rpm
d1f141377c37bfb4691faf97a959ffdf37f9c64b63aa974b4fb0283d2905997c
glibc-langpack-sr-2.28-211.el8.x86_64.rpm
e77e3dbdb504daa7161a8e881fea43900bb93f84a5ab6c9663f40f6eade80033
glibc-langpack-ss-2.28-211.el8.x86_64.rpm
9db7489c5272ecda026233a1b42c34a47ab62e519373bbd3e548e05967796bd7
glibc-langpack-st-2.28-211.el8.x86_64.rpm
35eb7eea9399df9e8aa0c1a17ca5819eac57f237721cf921eeb35f7bf7b7e857
glibc-langpack-sv-2.28-211.el8.x86_64.rpm
c8199e33c5ef77aff0a3510cc7940904c8a3aa0e875a10b863e3824408150988
glibc-langpack-sw-2.28-211.el8.x86_64.rpm
d4b151cd2bbba3db7ab6462da2eaadb97be452ea81e60d2a356bce557e6047ed
glibc-langpack-szl-2.28-211.el8.x86_64.rpm
744c2a96f0b490477c57457329d9d8891247bd01030747bb95708a18268ce109
glibc-langpack-ta-2.28-211.el8.x86_64.rpm
37b795be6ea1a9d317896c4efbdad7708106f971cd974d62f4d2247c471c2930
glibc-langpack-tcy-2.28-211.el8.x86_64.rpm
eb7308a2063ddb7e71eea9ad81c5a6d220dc614a50d3087c309a359d0680349e
glibc-langpack-te-2.28-211.el8.x86_64.rpm
ea559641b6bd68551ee49729ffd9bbe2aa095f3efc394cdb848ec4c346cc5a11
glibc-langpack-tg-2.28-211.el8.x86_64.rpm
3b10265ba7c183a2ab02170398156695aff2da9d090b2f258ffc863f7777f00a
glibc-langpack-th-2.28-211.el8.x86_64.rpm
fe01360cb946f3a6045d6d47c700539508378c30f42e61272a61377fd08fc6b1
glibc-langpack-the-2.28-211.el8.x86_64.rpm
32f00d91c33f313550beff90b6758b70b062b4e3760b730391e52cd66bf1f03d
glibc-langpack-ti-2.28-211.el8.x86_64.rpm
4e540192ae438bce2699e4faabb491f62b2e81a06272ab981cc8d11cdc2452d7
glibc-langpack-tig-2.28-211.el8.x86_64.rpm
03465a52509dda32f1f9eedf84890034877876f456172d388ae69aefcd5ef6fc
glibc-langpack-tk-2.28-211.el8.x86_64.rpm
d664ef530b1d8f97318bb4d51fab38e4b07e2884f60995a23f13b86e1d9fb730
glibc-langpack-tl-2.28-211.el8.x86_64.rpm
d7ee87491daa6d1960b8a308ccdfd3458136fa0b54d020d909f338c52165250f
glibc-langpack-tn-2.28-211.el8.x86_64.rpm
ae11fba30a7055126f39f9500315a2a27959c764c4c94a7620f70ff115fa29b2
glibc-langpack-to-2.28-211.el8.x86_64.rpm
0e92344e660323537a4d9e9e7217cf586eb3f7d12c2ae4afaf5aec3589929457
glibc-langpack-tpi-2.28-211.el8.x86_64.rpm
8314de17011d2e9e8eaa83ac808c7e06b7a3863622448f2f3c452880ae4d3840
glibc-langpack-tr-2.28-211.el8.x86_64.rpm
63313c9815a9bcb48b4a8eb56219170eb6bb32fa67ad50f045325b8057b3cc51
glibc-langpack-ts-2.28-211.el8.x86_64.rpm
1cefcce0296b0faa9b1c7a4e30373f4b9f52cb6b239cf54ef60e5ba75f90350d
glibc-langpack-tt-2.28-211.el8.x86_64.rpm
0a27f3693b203b6f6cc2effe219267336ed4826787608f2c5c494be2adf0f9d1
glibc-langpack-ug-2.28-211.el8.x86_64.rpm
0e9c7296bd63e0267b92278bffd1d48724eaeac6f752cb04804c0087f5680305
glibc-langpack-uk-2.28-211.el8.x86_64.rpm
f85249d70dc081198c63924512439e94ba491a2fff719cf2dd2ebd440144e9df
glibc-langpack-unm-2.28-211.el8.x86_64.rpm
1c0162c0f200c837c808bde800120961100d8b8d0803581469b37f8fb8c3493c
glibc-langpack-ur-2.28-211.el8.x86_64.rpm
fd8c9e0749d3439e218c1c82d334b0a3d59545e39df613a13ce98651edbd2b8f
glibc-langpack-uz-2.28-211.el8.x86_64.rpm
c60c2086c6964f788f40a3630fe9aaeba86456d0d02fa201eced2c6affd56ced
glibc-langpack-ve-2.28-211.el8.x86_64.rpm
75ea8bffddfaf832d5b49594b62359fd33a4a6072752f44b4199abae74f5b237
glibc-langpack-vi-2.28-211.el8.x86_64.rpm
6b540ca86b0881c9fbc1d84e45b2643b729d18c9c670de82cde1162e5eb6f33f
glibc-langpack-wa-2.28-211.el8.x86_64.rpm
356024e400ed63651ed21132676fa51d8e97cfa4596683184a53c93ca9831efa
glibc-langpack-wae-2.28-211.el8.x86_64.rpm
481fd4d0b9429e7fdbf846f4e4bc699ef7bfd3fa1632ef12d2d58e36e3a3c5d7
glibc-langpack-wal-2.28-211.el8.x86_64.rpm
efcf0312bd52f3db6ef951030722e1f6c14f562cabc4c6f244faa342ab8d4e63
glibc-langpack-wo-2.28-211.el8.x86_64.rpm
5fb80d43cc1c1786e22866527c4eca340fc08a4ac353546a5d494bcb3309ed46
glibc-langpack-xh-2.28-211.el8.x86_64.rpm
6f9f16d9ff7e58b5b734f0ed7730ee883547b33beeb2ec356dab365007bfb3ce
glibc-langpack-yi-2.28-211.el8.x86_64.rpm
708ff469b57540b28347756634f3689d940398cdff0b679b3b0c8d3dc9cdeb02
glibc-langpack-yo-2.28-211.el8.x86_64.rpm
bb592d6ae42597f720fcad5e1635044bba94383a3096d3ecf22c4f6333efd982
glibc-langpack-yue-2.28-211.el8.x86_64.rpm
001b8dddd4d34038a3a03e59c76eb2ede3df24f475cba1eacc2b7619dbde4408
glibc-langpack-yuw-2.28-211.el8.x86_64.rpm
e1dfcf0d9913099f1a0294ec0233c5c8ad859222bb77c39a28016814ca9aa8e9
glibc-langpack-zh-2.28-211.el8.x86_64.rpm
4d74ee2e160e5fffceaa826dbba80426d9bb6530bc8bc8c99d64ec28e851c96d
glibc-langpack-zu-2.28-211.el8.x86_64.rpm
fa647ec8ab449cfdee8413ef938f07a19b2ca8ea8c89c791c142e35bda86823c
glibc-locale-source-2.28-211.el8.x86_64.rpm
c83175208f97e929d04ea595ea0df7e93cddc571c62546f4a8707df52d16b300
glibc-minimal-langpack-2.28-211.el8.x86_64.rpm
802ae4e74ce02c9fc87142959e11751c95edd15ea3a2289291cd645662674198
libnsl-2.28-211.el8.x86_64.rpm
7d38cb78423ef1a3c425de81a53d90ffe7874bf84ef4887a6459730f78c642d7
nscd-2.28-211.el8.x86_64.rpm
9c39a3a126fdd6de7b9c29683ba26f53606310fb1e9e7b91658f5838e27b139b
nss_db-2.28-211.el8.x86_64.rpm
13ab2754dc35a893efcc5316ea052b751eb9391beb23bf08e81c3159230a17dc
RLBA-2022:7686
iputils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iputils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iputils-20180629-10.el8.x86_64.rpm
3b12faafd3aaa7ad0bdb4a2b9e2a46ffe7c2f6fe17560e329ced2fdb023bf30c
iputils-ninfod-20180629-10.el8.x86_64.rpm
ab939a77cbe6a8842bf16c271119cc41038e6317d051fba258927d0bcf9ef4e8
RLBA-2022:7687
procps-ng bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for procps-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
procps-ng-3.3.15-9.el8.x86_64.rpm
68cd2593fc4e6587e6d217ad7f031edb276d56c9084ebd4607a0a59a05f90c98
procps-ng-i18n-3.3.15-9.el8.noarch.rpm
df5d21d0a9941e6b283de24c4daefe6ec93e8ceab3e7acce43f3aa91546f6c0f
RLBA-2022:7688
gcc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libasan-8.5.0-15.el8.x86_64.rpm
9af822bd0227e1b4d0aa2f9b266ff8698e4380586985e7cd6063d767e786b42c
libatomic-8.5.0-15.el8.x86_64.rpm
6f97772b72d85c8700210e680224d94c2b625391de7d6344ee9c5fee66a55a51
libatomic-static-8.5.0-15.el8.x86_64.rpm
76eb6015f89d5be0f6c40202c9b18fab5a4811fbebdc09aad8e81963c5c7ffa2
libgcc-8.5.0-15.el8.x86_64.rpm
8c66cad2900e8c92f32b30a5f2472cf32e30ee88098bec39ad868c1c8cddc469
libgfortran-8.5.0-15.el8.x86_64.rpm
d47ccb0468adb8ddf31f246eb890b076e24dfdace96bc4b06d046ecc605be3ee
libgomp-8.5.0-15.el8.x86_64.rpm
d45a6c6a41508044d351bec3cfb1dc14222ed64cef75d7e2f7051a45f33a885c
libgomp-offload-nvptx-8.5.0-15.el8.x86_64.rpm
ac734747de3a67074bb41287a03aba5721eefdd603f515e8edf6d007ecbe022c
libitm-8.5.0-15.el8.x86_64.rpm
ccc35b6712684197b4d21057419b5529fa6fd7dfebc7be7ab943fe59a0fb2682
liblsan-8.5.0-15.el8.x86_64.rpm
8d26a050c587169ce68b66e00985598116d8337120f2a9f1c5f1eac6575223a5
libquadmath-8.5.0-15.el8.x86_64.rpm
5287451bb6c6e7749b03b831efae7d5139d4487b74bff4e77a71778b36736572
libstdc++-8.5.0-15.el8.x86_64.rpm
4a62b7a7caba2dda46b77bbe00fbfa8cc9e52cc2332c59bcc84dad07666e536b
libtsan-8.5.0-15.el8.x86_64.rpm
742a0839c8c705bdf1459cf4677a56a85c676e34052a85ca9aba620dd98d5043
libubsan-8.5.0-15.el8.x86_64.rpm
aee698d8f7416f71c959e9b169f7e3f59f24c6e522321bdf690ddb05c25a06e1
RLBA-2022:7689
accel-config bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accel-config.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
accel-config-3.4.6.3-1.el8.x86_64.rpm
c4a1dce24e77efea0a75de123be3d0352887bdcd9fd883978a4790b9a63d1b4f
accel-config-libs-3.4.6.3-1.el8.x86_64.rpm
05003da79eeb4f7f6dbe6a9e7ee8f9c8bd86a908c493b2eb05c51a5bc0c9d76c
RLBA-2022:7691
selinux-policy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
selinux-policy-3.14.3-108.el8.noarch.rpm
c8034fbd86e19f9162ab575001f2ad66d5dbc900e97fa9a95ae3e70aec8e7dde
selinux-policy-devel-3.14.3-108.el8.noarch.rpm
cd4a2d1bdf0dd76ab84f0b5d2e5fc51361e2aaa25817bf04f96d968324a47465
selinux-policy-doc-3.14.3-108.el8.noarch.rpm
df6debc6a1a0e39d5907151d541899d4fbf35a6ae6689f94404767cd67daa65a
selinux-policy-minimum-3.14.3-108.el8.noarch.rpm
09f25bf811f906c626041136acfb157ccad7234b66553a191616bfd087c32eb1
selinux-policy-mls-3.14.3-108.el8.noarch.rpm
5f9f7e496c7efeb6bd3507ded0921c4187f3a954d1afc8f649f46d293abafd5e
selinux-policy-sandbox-3.14.3-108.el8.noarch.rpm
d3b78e4cd13f6102348a39898910ca247f6963937e114f21d5041ee96e8bac55
selinux-policy-targeted-3.14.3-108.el8.noarch.rpm
f7d7192718b7ac1997ef75f6d3b4fbc0e4e931ede22df6b538ca0719dcf7e5ab
RLSA-2022:7692
Moderate: xmlrpc-c security update
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
xmlrpc-c-1.51.0-8.el8.x86_64.rpm
a479c10be9c0632b5541f0bc879f2bf963461abcd93de0a5b026545c8d140ca3
xmlrpc-c-client-1.51.0-8.el8.x86_64.rpm
447577c58bdde8c8b2d7adddd6de73a68c3de2b47f051d3d30f010992348a762
RLBA-2022:7693
binutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
binutils-2.30-117.el8.x86_64.rpm
34f7602fbd564a454544d50e57deb70341f0e0be42216083f56d837f42eba37e
RLBA-2022:7695
virt-what bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-what.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
virt-what-1.25-1.el8.x86_64.rpm
fabac9bd1b7d15e26a33078807e9a0f4a14cfe3551c6c1a7af0313c2b1fdec55
RLBA-2022:7694
tuna bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tuna-0.18-1.el8.noarch.rpm
58812fb015dcd75c62973e25433bd7333239d1239cabab22e2d022d60e268623
RLBA-2022:7696
krb5 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
krb5-devel-1.18.2-21.el8.x86_64.rpm
5ce59851d62de2e31c383e2512b090abe15dbd7c3ba0454e3cfc2c0c3b8adac8
krb5-libs-1.18.2-21.el8.x86_64.rpm
796cbed78d747711d64dc2b8b60c0ca62728062c6258cba9e84e42acd3a6588a
krb5-pkinit-1.18.2-21.el8.x86_64.rpm
29e160152243b5c08f0dd057aec98b9e7937cededbb918429b6918c516907a45
krb5-server-1.18.2-21.el8.x86_64.rpm
aa0bede22958f981c67cc7b023d67bff3ca033d0908d1c72adac0f1701b622c8
krb5-server-ldap-1.18.2-21.el8.x86_64.rpm
fd9c947f542df096119fc9839dd47bd561f747d56260682c4754a0fe513845cc
krb5-workstation-1.18.2-21.el8.x86_64.rpm
a39e550359f319aa3195adab4634d7d26c853847f9918849f654c7307dd1c3c7
libkadm5-1.18.2-21.el8.x86_64.rpm
46ff23ed4b7d93deb37e2815773e2c2e22b255afd05b79cb514deef905df44ec
RLBA-2022:7697
python-dns bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-dns-1.15.0-11.el8.noarch.rpm
edf964bdcc51d9bed6d9652a1e3f86add29616c7d5ae6e5be2667f7bdb82145e
RLBA-2022:7698
samba bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ctdb-4.16.4-2.el8.x86_64.rpm
0e38640b4ec7e2b978e56acd18714c095400ad751b0968c41a9a05b8f9b0e1d8
libsmbclient-4.16.4-2.el8.x86_64.rpm
0dd0bb391302d55239191bca072be53b02b3752837b1d77bbe176f8236e24427
libwbclient-4.16.4-2.el8.x86_64.rpm
605b793089abfbf4f92f98e527dd7463dfd40d2387d8c0f317f9707235a291ba
python3-samba-4.16.4-2.el8.x86_64.rpm
303a580980adeb8ab55d440f8b56fd318e9a104c8d309a1331ae795f84cdb650
python3-samba-test-4.16.4-2.el8.x86_64.rpm
b809fa56fa6fdde3658b15b0656a4a6e8cb410427024fc1003fb916b714ee8c2
samba-4.16.4-2.el8.x86_64.rpm
9cb7f8889b28c4f1ea4e24e38acbaa7759da4c16bb3f5cf8d724407cdb7423b6
samba-client-4.16.4-2.el8.x86_64.rpm
3c1667e71e3c3e196842e00d86bbb17ac92c97fa161f0d5da65579755a0834e5
samba-client-libs-4.16.4-2.el8.x86_64.rpm
79397bc1743c61409d33178e96ba8bf46c9df89b28b8ba84d90f8b5e28ace651
samba-common-4.16.4-2.el8.noarch.rpm
64ca28af1e9830cd10c7b6f5e971fbed4f5b32f49e10a5a6b35c49b39149566f
samba-common-libs-4.16.4-2.el8.x86_64.rpm
2f2abfe87a737b2c8c5b82c3adc66ae80fd57230051e8a384e56ccf00293180d
samba-common-tools-4.16.4-2.el8.x86_64.rpm
b0b8ad30851aef77c97e91aea58105e653135c5ba454bca2beb9ddeff7c2c4e8
samba-krb5-printing-4.16.4-2.el8.x86_64.rpm
d717b197d5142a075413705f5c32bdeff4d7141701206ecd004b4b5ff1d5ab1b
samba-libs-4.16.4-2.el8.x86_64.rpm
95cea17d30c85a8eaf60c01f7ef7ae3ba71537e71e5bcfef0de9d13f5fb7ad23
samba-pidl-4.16.4-2.el8.noarch.rpm
4cc8b11a0da7253d955db6718ecb3a2e135c35ee7252f097fa2086390514eeee
samba-test-4.16.4-2.el8.x86_64.rpm
82b0fafbfbc000ef9af39979d34eb8cebb3bb3a167d08d5b48e570be5cf5d6ad
samba-test-libs-4.16.4-2.el8.x86_64.rpm
2050207a79247f730a87e4b8a216144c1ccaaccc08c3a00fef7b14db8eff782d
samba-winbind-4.16.4-2.el8.x86_64.rpm
490135536def3c41862706c296f7367cd78c48ed204f4dc434b09f196a46b3a7
samba-winbind-clients-4.16.4-2.el8.x86_64.rpm
02038668ff44e44a719d737e6c626182b206fe163ff56ad208227f0d5e024e8d
samba-winbind-krb5-locator-4.16.4-2.el8.x86_64.rpm
2dc4473eea1bf2dad7aed315b52bee836c73b60e6f7f01994081cb518fb322cb
samba-winbind-modules-4.16.4-2.el8.x86_64.rpm
b94884675f1961552976e7e81d1831dc9b9f805d982fb4e3bbe5e87280c36431
samba-winexe-4.16.4-2.el8.x86_64.rpm
f3043b4ed152a6269f5011d7ebcfd9c41cac7bc5456203d582772a8aebe39769
RLSA-2022:7700
Moderate: gdisk security update
The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format.
Security Fix(es):
* gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256)
* gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gdisk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format.
Security Fix(es):
* gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256)
* gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gdisk-1.0.3-11.el8.x86_64.rpm
66ec9a7958e276d05cecf94279a216e66c8664f0b63aac5c53eeb0d34c246190
RLBA-2022:7701
at bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for at.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
at-3.1.20-12.el8.x86_64.rpm
7dad5b93c2f318e53bcba41d9b7dd073961c151779ba5bf41ccfbfd6db4b6f8d
RLBA-2022:7702
mokutil bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mokutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mokutil-0.3.0-12.el8.x86_64.rpm
765e690a5c254620bb629ad9471fe881f91ea5d088986b18237af8e27a1bd466
RLBA-2022:7703
python-slip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-slip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-slip-0.6.4-13.el8.noarch.rpm
969e55a97a50fc39da7bfdd3ef25fe8f31c8485db610e2cbf15586f8e956517c
python3-slip-dbus-0.6.4-13.el8.noarch.rpm
42102433519b624f384a59b9eb824ac7e37d917ee08dda1c3f4c454be89e06d6
RLBA-2022:7705
kexec-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kexec-tools-2.0.24-6.el8.x86_64.rpm
1fe05da1e61f5df5088315bfd79228ec13ef66cf05249ca78e4ea0ca055a86f6
RLBA-2022:7706
which bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for which.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
which-2.21-18.el8.x86_64.rpm
452c98861a00ebe8903c9ceea28d3cc425e5f35fd5dcc54e21ca7cff331f598d
RLBA-2022:7708
expat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
expat-2.2.5-10.el8.x86_64.rpm
cc3b62a23e3dfa72fabd4f06a3d67f261877ae569a68b4119f8fb6980f08c5a4
expat-devel-2.2.5-10.el8.x86_64.rpm
6d946c3ee2ccfd83c09412e7829bcaf478584f34528cc86ecaa7991be9cb5310
RLBA-2022:7707
nftables bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
nftables-0.9.3-26.el8.x86_64.rpm
4eeea5699f800844a942a92a51c16dd7b11caa238c9a3bb0a5d8f10650e9b723
python3-nftables-0.9.3-26.el8.x86_64.rpm
842ffb02c17eb98e7d0ed5e2222e999f77bf720a42b81a01dddf602f74778964
RLBA-2022:7710
rng-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rng-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
rng-tools-6.15-1.el8.x86_64.rpm
2998dd57d15c67862f9f2958611c266982654b665acabd253db464aded8285e8
RLBA-2022:7711
libdnf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libdnf-0.63.0-11.1.el8.x86_64.rpm
5fcc8c4c2a56aaf9023659fd1cecfa7d3ff8b5bac1ba13a55b05ede73ed19ef9
python3-hawkey-0.63.0-11.1.el8.x86_64.rpm
1f8a0ee73be22b830ba2074cedffda92bb189c3d5675c943113824fd0c20ac81
python3-libdnf-0.63.0-11.1.el8.x86_64.rpm
355f01e59ade60cd732a49596bff65584278536cc5184bfb6b91abce805decfd
RLBA-2022:7712
dnf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-4.7.0-11.el8.noarch.rpm
948fff4b3cea109242e6d308e3256bbdcd26f214a044898075f7b8f77a0b80a8
dnf-automatic-4.7.0-11.el8.noarch.rpm
2ff731967901546be305af1b8d7452e53e3bb8660c6d00cbf939060977415603
dnf-data-4.7.0-11.el8.noarch.rpm
48782a17c1a4f7c89035d7eea46f681fce219210e17e727a0f816c0913fe32c2
python3-dnf-4.7.0-11.el8.noarch.rpm
075e1145f2523acd593dc9133ad5d094efa3bf7d76816756b2966a77ee4203a6
yum-4.7.0-11.el8.noarch.rpm
58f20b0790242c6216c79ee52c72e4edbe869b66aa14e2d8364c41b22aa2b50f
RLBA-2022:7713
libsolv bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libsolv-0.7.20-3.el8.x86_64.rpm
fe43d02c561ff2698dbbaaff45de2e833dd87627ae7ff396d6982510aac43f0b
python3-solv-0.7.20-3.el8.x86_64.rpm
1463a99a36051f38291d6a6fc03e23f9d09481026eeeddc30562a2ce67972a01
RLBA-2022:7714
device-mapper-multipath bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
device-mapper-multipath-0.8.4-28.el8.x86_64.rpm
1a3cbcf38fbf179e4de359a446012fae850eca48a2a952514a7cc8bdee2a01e7
device-mapper-multipath-libs-0.8.4-28.el8.x86_64.rpm
c516814bc813cff77ffc44c7eb73b7356935ce1bc9017915ed8f5913dbccc567
kpartx-0.8.4-28.el8.x86_64.rpm
9ee0a475618169cb5287ac50497e4fe5fc64659e086f8e87954d8e345aee149e
libdmmp-0.8.4-28.el8.x86_64.rpm
7e853093f40fdbb5d32d6c7275662aecb720696ca436749b778f843cd1a6ceb1
RLSA-2022:7715
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libxml2-2.9.7-15.el8.x86_64.rpm
ec91cfbefc82671eedca3fe6c54930f37dd83bd55bc4a2780c8a12b1cc74879a
python3-libxml2-2.9.7-15.el8.x86_64.rpm
ceb24cfc2a7d6652d36311e77ffe4865c1e957d605feff42ea6c3a9a6a4270d3
RLBA-2022:7716
cups bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cups-libs-2.2.6-50.el8.x86_64.rpm
265a56f7893b17918e27ccb7023bb44b2bd104173146e55992e0bb3188b4e312
RLBA-2022:7717
elfutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
elfutils-0.187-4.el8.x86_64.rpm
7473bda0fa5ae598fa49f84afa0c974a3360ae6a837ae9c25ba4fcf694e4b14b
elfutils-debuginfod-0.187-4.el8.x86_64.rpm
b40e7276d51c80562f8f7a096446efaa0084fd2e533ea5308c7ed916fe834f12
elfutils-debuginfod-client-0.187-4.el8.x86_64.rpm
ebf366d9e220aa1a877a1697905844ec8db5a79d88f35e3eccd558b83eb5e8f9
elfutils-debuginfod-client-devel-0.187-4.el8.x86_64.rpm
80de62b9e71da2a6ac9dc910231cbf763ecb3e803c61810f57ff26a302a93b39
elfutils-default-yama-scope-0.187-4.el8.noarch.rpm
b01511cf066f23b46d7e0dbf923e653635f3265b7619d30414a5f1ca25ad6e73
elfutils-devel-0.187-4.el8.x86_64.rpm
9601a685e489a7b4e270dc9bc28bcc8ee0270bdebf564d09cae2fa4a1a7f9ad5
elfutils-libelf-0.187-4.el8.x86_64.rpm
7f55b5cf8ef85d3d21bbe1fab9753b3b6f2c7ac407f26c9de4fb40fa2e00a587
elfutils-libelf-devel-0.187-4.el8.x86_64.rpm
b5080e0da7d1904c3228bb56b5d471380726106b9423d5d781912c61b6485573
elfutils-libs-0.187-4.el8.x86_64.rpm
bc1f8ef873477bbfd6b1c86ca70251958ef936df068abbe107caea92555e4904
RLBA-2022:7718
cockpit bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cockpit-276.1-1.el8.x86_64.rpm
d226e5f0e7b7bab482f8edc8d28be33cdba4a2380c3f612c187743018ffacfda
cockpit-bridge-276.1-1.el8.x86_64.rpm
6739e52d18742bc329be5b7d5f7ec23e5b65976520e08bf95273229145ec9386
cockpit-doc-276.1-1.el8.noarch.rpm
891dcb760e2e7df7ff43831e2874fb96dcb15aaa16d03baafe7a2f18d06c9787
cockpit-system-276.1-1.el8.noarch.rpm
e1ecbc2e62b5aca745ed0929da469ae80504d3baecee1fb61a5150cad1ce4537
cockpit-ws-276.1-1.el8.x86_64.rpm
26b8e53b96d11a89ebd8c1a5ff17256d9dd79b84fec8cb78b7af8a28fe262341
RLEA-2022:7719
subscription-manager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-plugin-subscription-manager-1.28.32-1.el8.x86_64.rpm
2a4bf35ad6bc63aa96167270eb92be3c5c2f36f53ed8082f8bfbef091bfa1214
python3-cloud-what-1.28.32-1.el8.x86_64.rpm
a2e98a225767c1a148bf43e3652d4d3071a1388456bb1e3b1fddeb731eb3c88c
python3-subscription-manager-rhsm-1.28.32-1.el8.x86_64.rpm
543b45655ca92135d0dfc78815fc1927f4a603ecab8f903f2f72ef056412288b
python3-syspurpose-1.28.32-1.el8.x86_64.rpm
b27ebc6837ff0879903ff0532c80cdfb0e2a9b1f6bfb63791b7bf31ccb348b0d
rhsm-icons-1.28.32-1.el8.noarch.rpm
f644f44033ecb86e842fd031abc77e9749f3fe82ec978af9b936003fa63b8d3a
subscription-manager-1.28.32-1.el8.x86_64.rpm
639b2b58d29124cf8b71d9ca8efd18cd2bd08ef0832426d7866522d3d6ebce5a
subscription-manager-cockpit-1.28.32-1.el8.noarch.rpm
0d02c1271b223de8b704ff7dd8015a0f69d2be13709a4c3033ac7a6ec1b8ba63
subscription-manager-plugin-ostree-1.28.32-1.el8.x86_64.rpm
947094fc36f4fe7412fd35a259f3fe4cecabcf3a17242cfab4821bfce363d242
subscription-manager-rhsm-certificates-1.28.32-1.el8.x86_64.rpm
9e173673bd5d1f608f090d49ff7ac5de1256ce0d1a599228fc20e2576e5bcd79
RLBA-2022:7721
cronie bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cronie.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cronie-1.5.2-8.el8.x86_64.rpm
b9776e48474af4047000b71d4ef61ffe8f749696836d3a027aa74411811349a6
cronie-anacron-1.5.2-8.el8.x86_64.rpm
d559fcb4fd80e9693ffae611888d0645a38cff787fab6ff0e2a5c01fae2186cc
cronie-noanacron-1.5.2-8.el8.x86_64.rpm
5b63f1de1b158eb8d4e95741e5678ca711acf23cf4c8cf85257a768c47ffbd02
RLSA-2022:7720
Moderate: e2fsprogs security and bug fix update
The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.
Security Fix(es):
* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for e2fsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.
Security Fix(es):
* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
e2fsprogs-1.45.6-5.el8.x86_64.rpm
6878cc0c37fce2415f4c330afc1eec5c5e72af50c5b4842183c82ee36c72ae78
e2fsprogs-devel-1.45.6-5.el8.x86_64.rpm
802c56a40eddb2ff95f4db334989bf8341752e7561222dc214ffdcd9a354b710
e2fsprogs-libs-1.45.6-5.el8.x86_64.rpm
f2764b8398e95071999bb2593ab1a01524d1ce88df2a7930c99bf70e7ec6b34c
libcom_err-1.45.6-5.el8.x86_64.rpm
7c8a761d037c4aca0f7279f61b7b10762121221442506a6f561834cc60e2bc19
libcom_err-devel-1.45.6-5.el8.x86_64.rpm
1341faa07bc64c3ea21b4e93e204a50e4b5d88daa5a9b169cc5e80bf244f9eec
libss-1.45.6-5.el8.x86_64.rpm
bcf9353cbae4b107cde09f7a432e373d3af7c6ad9e2e527e1c8795317f237010
RLBA-2022:7722
libcap bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libcap-2.48-4.el8.x86_64.rpm
6ae8aa1457bf79b15f68536beceacd24e982067065db2042da7e3a02c7ceb8f5
libcap-devel-2.48-4.el8.x86_64.rpm
0dc5f61bff8797b2ab38229f566b52a0094c56b105205119c21894f8a24509f9
RLBA-2022:7723
pam bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
pam-1.3.1-22.el8.x86_64.rpm
8f7b51a0ba4cbecf64e8afc85adb217d82138e8a4d8beef8429a14b867522e29
pam-devel-1.3.1-22.el8.x86_64.rpm
80cd78fdf9ad5c6c1bf5a51cf9e2fadffdcac91be56fa407708f7b633fd564a7
RLBA-2022:7724
zlib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
zlib-1.2.11-20.el8.x86_64.rpm
f13232d2485bfdc3eb03d62f53bdfd05e003886ff68f5bd609da49b32b7a44e2
zlib-devel-1.2.11-20.el8.x86_64.rpm
5aa63ca09326893c34ece592fc1b097c58ac1a95dc5b18524c6946ea5ae05451
RLBA-2022:7725
dracut bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dracut-049-209.git20220815.el8.x86_64.rpm
c26ccaa038491a1eead7b5c00f18661d2aa1a6210af252ea0f76b8a1b6cc39d6
dracut-caps-049-209.git20220815.el8.x86_64.rpm
c45c066989a4cf572f2226e21d19a6567690a71b6ed565dd4f89d256b2704ea7
dracut-config-generic-049-209.git20220815.el8.x86_64.rpm
c9acf987033e75b4b06a8c47221cd8de519b2f0d4f7f73e83b9e5c9165c921bc
dracut-config-rescue-049-209.git20220815.el8.x86_64.rpm
189ac13df7997885485f2d85d45b7639170fd89f4ed042319d9dd9959edda31f
dracut-live-049-209.git20220815.el8.x86_64.rpm
4d8a8fe3d0bdfe356038d05b6022dc29172ec9f9a67e3f5313cd6918352e245c
dracut-network-049-209.git20220815.el8.x86_64.rpm
494b6cd946340982f52e962dac1178497a9dde4861ad5cff12e6d83771b07688
dracut-squash-049-209.git20220815.el8.x86_64.rpm
a9626b589ca1d4e31913372897db6698ed079b485fbc38bf0f194bc0af1e8b4b
dracut-tools-049-209.git20220815.el8.x86_64.rpm
3f1772ef424fdddf170defa2b0a55667f43f3ae813034ea255b18d2f20ff8d3a
RLBA-2022:7727
systemd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
systemd-239-68.el8.x86_64.rpm
d50bbfa4cfdb3812d4019b97acb0ea08b6dbd73e3495181b66f98006b71e9e9f
systemd-container-239-68.el8.x86_64.rpm
5e3dd27c3a1df2ec935675360f6f6ad1778ee47afe8507fb92335413be879b9e
systemd-devel-239-68.el8.x86_64.rpm
12dbbe12fefc8f3801c5506db6c2ea8b2d86476c47a3852625a9d816a61d084d
systemd-journal-remote-239-68.el8.x86_64.rpm
0b66a69cb7ee42d01a686707198f276f44cacaee503f13cefa4a942058da59d7
systemd-libs-239-68.el8.x86_64.rpm
b7a18c5106b5a4e7c64433480e16dc1e43ad1d03aa729684c79064a1f75cad24
systemd-pam-239-68.el8.x86_64.rpm
bb7f24cfefcb244b76e9ce9e3b3d9246239928034cedb4ff562e4d29c3787e4f
systemd-tests-239-68.el8.x86_64.rpm
cb3f58923f5bb2f8049b798301a9764f16a78c822563be1b4f460f1f9fd68d40
systemd-udev-239-68.el8.x86_64.rpm
acd46f31d4e9ae58f61dd68fd4fee3ebefb166dea1123f1e1bb192de1afcfd6d
RLBA-2022:7728
libtevent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtevent-0.12.0-0.el8.x86_64.rpm
7c9572eb5dbb8320b1f0285f696f09f36e95054a1e2837a49a0f89f9ab4558d9
libtevent-devel-0.12.0-0.el8.x86_64.rpm
b4542af7df99638c6f352b42984c32721ca2207fc8871a96baf8afd726f7facd
python3-tevent-0.12.0-0.el8.x86_64.rpm
f5576e09f7206cfe12db8b0115dc7fbe229292bb7707069b23c393a5083dd0e4
RLBA-2022:7729
libtdb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtdb-1.4.6-1.el8.x86_64.rpm
896d8869d37997f2f2c9ec749646a6ffffe6ac2e3214abe8b87538a6d0bad112
libtdb-devel-1.4.6-1.el8.x86_64.rpm
debe9ec4ee8919fd49decd99cfc2830432b32f2afc1dd6b1d03328e49c99b71b
python3-tdb-1.4.6-1.el8.x86_64.rpm
634ffd38f06ad95f6a0c4d39f7a9f05cc1d232706a4cbff7db342d53705677b8
tdb-tools-1.4.6-1.el8.x86_64.rpm
010c470b6aece7ba5078bd25d678767a3e14537df8b0195a3ca7b9805dd7a359
RLBA-2022:7731
ding-libs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ding-libs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libbasicobjects-0.1.1-40.el8.x86_64.rpm
bb8c59145267245b9fbe4015f903ffb0e6e7cf67d813a13109aaaa4af95b15a1
libcollection-0.7.0-40.el8.x86_64.rpm
3084594020e071c6c0fb640ecb5ec23048987cbc9a46b49d91da9cd086dcbe59
libdhash-0.5.0-40.el8.x86_64.rpm
bf2b194833eeb149187efab628e9a99e532ff94a9dac11888aae43c3673458ee
libini_config-1.3.1-40.el8.x86_64.rpm
1cb5a54f97b62ee8759de04722540d60d3a21e9938e63f3e0f729821cd4109f6
libpath_utils-0.2.1-40.el8.x86_64.rpm
8835e841ec98445af29550ee9b3a5c4b3f844dd71859f29448b8a124f007b762
libref_array-0.1.5-40.el8.x86_64.rpm
c8ca02aaf38b445e377ead5fbf1f4ca93da2b82ab19ef449c1d59f583f5a2561
RLSA-2022:7730
Moderate: libldb security, bug fix, and enhancement update
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484)
Security Fix(es):
* samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484)
Security Fix(es):
* samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ldb-tools-2.5.2-2.el8.x86_64.rpm
8491b20ca4c0a1fc70e90a73ad037eda2675e81db9ede946317e5b6d0ed9ac88
libldb-2.5.2-2.el8.x86_64.rpm
ce2b5b6302968060f62d5804d5e4d27e1a230b1fccb78fccf5ef6b33f7e382f1
libldb-devel-2.5.2-2.el8.x86_64.rpm
ebfc75d131cee929f9b532d4a62967d0b09ef039b98aa5d2a8325f98162a13ad
python3-ldb-2.5.2-2.el8.x86_64.rpm
b93a9b330665a5586c7188845c74f445672d8ba8df1afb5eff80b76551eb0c92
RLBA-2022:7732
sos bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
sos-4.3-5.el8.noarch.rpm
ee738963148db3a0e089207c8d3eae0476334897414147f59928f771b427fd4b
sos-audit-4.3-5.el8.noarch.rpm
11f63711cbf952f7e5f0eaf592db922d8f08a7b93d42604859ac6e2f66c4a4d3
RLBA-2022:7733
alsa-sof-firmware bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
alsa-sof-firmware-2.1.1-1.el8.noarch.rpm
a43ba6cd50f9ec68ea27a934bc4a193f2e61d5c25a00ccece3ef94e798e8eb6e
alsa-sof-firmware-debug-2.1.1-1.el8.noarch.rpm
da2f7a90e1d042e3919263f83b90c47b969662446a365394e5503dc127b194f2
RLBA-2022:7734
rpcbind bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpcbind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
rpcbind-1.2.5-10.el8.x86_64.rpm
b36da1043f7f45fd4baaae87a80f66215803bd0f2a9a69c5d03ec9c0df60a4ab
RLBA-2022:7735
bluez bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bluez-5.63-1.el8.x86_64.rpm
5f7b23929721e93dd87d4f0b2aecebdea31e6508ef16f12d7e69341eeb66d83d
bluez-hid2hci-5.63-1.el8.x86_64.rpm
49bb95c3e4ae87a078866bbf714c358dfa75c32974bb3a63194793344c0dc304
bluez-libs-5.63-1.el8.x86_64.rpm
cf0c60f452cdd6f0e32b44d9bc89d2c8b8c320c64c677272f711713cda6c4db2
bluez-obexd-5.63-1.el8.x86_64.rpm
905ea2875c3e655ceaa0ada6e02c25d4bde91a67b2176ec1d5cb3d334ddd59d2
RLBA-2022:7737
opencryptoki bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
opencryptoki-3.18.0-3.el8.x86_64.rpm
f3019ca847472876279dabe05f54f0999888f9ba38671a8ba35080c540e47180
opencryptoki-icsftok-3.18.0-3.el8.x86_64.rpm
04b792172b5105a591733f20edef5ad08672f3d6a09ad3ad614626eca9f5a420
opencryptoki-libs-3.18.0-3.el8.x86_64.rpm
193c3c2fdc2d5f64b2f182e546adcc71f80de8a7a0c144f0678f207988b3a719
opencryptoki-swtok-3.18.0-3.el8.x86_64.rpm
039d4cbd979c052b4ce5be040014175429fb058c8a38008e15d405a29ec1f58d
opencryptoki-tpmtok-3.18.0-3.el8.x86_64.rpm
361cc1915f6611d33e691d832d0faef83154e0e51ea35a8e2a3b5afa121218dd
RLBA-2022:7738
authselect bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
authselect-1.2.5-1.el8.x86_64.rpm
f5885226e8757114cf656b82ad04160e04aef0a9aab87c0e719ef53144cb2a2b
authselect-libs-1.2.5-1.el8.x86_64.rpm
8776c1a2e62ba1f864e7227d6a2cc3d390fb4dcd50bd1649ca95fb79c46b5a28
RLBA-2022:7741
mdadm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mdadm-4.2-5.el8.x86_64.rpm
ff7f517a8c40e9526dae90f51ad353706ce9c5ad28b6554ae452a1ba4033c844
RLBA-2022:7740
libtirpc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtirpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtirpc-1.1.4-8.el8.x86_64.rpm
d8d8f58573146fe53cf97fe46859ea02bd2d9f150a67e174a97d82311ad371b5
libtirpc-devel-1.1.4-8.el8.x86_64.rpm
3808f6fafd018a080b30c5b862a133824dbff26881902ab1a80307d8a7a5cbd5
RLBA-2022:7742
linux-firmware bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iwl1000-firmware-39.31.5.1-110.el8.1.noarch.rpm
b392e895d3afbd5ed826372f3604d908bab2709f69c6d60d13750e8dc81e3dfe
iwl100-firmware-39.31.5.1-110.el8.1.noarch.rpm
337a8fea74f082be29c60bee17d47093ef647a922bd506619bbeee0eb55a4da6
iwl105-firmware-18.168.6.1-110.el8.1.noarch.rpm
288ed43283f51c59b7e50a0dc593df6628870840f58321eae575a5b5380fdb5a
iwl135-firmware-18.168.6.1-110.el8.1.noarch.rpm
9450cd2506434c5aec720a8e08bc33338266d96585599046ee05f63459de5ca2
iwl2000-firmware-18.168.6.1-110.el8.1.noarch.rpm
29f026eb5e715fcb37bbab8ea3c9d27cae17e540ac1c5b573f6aa32625c791f1
iwl2030-firmware-18.168.6.1-110.el8.1.noarch.rpm
62e23f22cda37774d7119e98c9b10705e1ecf6e0e32ba7c0967e9fa328dce004
iwl3160-firmware-25.30.13.0-110.el8.1.noarch.rpm
de4b78e335e5932ba208394cc12aeffc7feed7acb2f18f394f3fb5cc568aba8b
iwl3945-firmware-15.32.2.9-110.el8.1.noarch.rpm
2d4181863240f991d144bfdb7647f47cd1fda63b8a3e785bc7ec4111a261dd4d
iwl4965-firmware-228.61.2.24-110.el8.1.noarch.rpm
f130043513b361d6ec69c1ad373406524f4d4d80edd8b055f5f0549c4753e609
iwl5000-firmware-8.83.5.1_1-110.el8.1.noarch.rpm
ceb43de383fa1e590c05ef040b769940f779212ecc27b3c719bd7c1305b43e2d
iwl5150-firmware-8.24.2.2-110.el8.1.noarch.rpm
ec9a2076dc4160925ab3972b816ad7a1b6f10297f66f8ad23aaaa5a340550724
iwl6000-firmware-9.221.4.1-110.el8.1.noarch.rpm
721c1b80f635aec0e4e243c20f4dd464bf5b1705b369e0a27cee734931d2c743
iwl6000g2a-firmware-18.168.6.1-110.el8.1.noarch.rpm
726669bdca669cf5abe6933d294f1248737844f315371c32716e13501842dd07
iwl6000g2b-firmware-18.168.6.1-110.el8.1.noarch.rpm
b9cdf0312038d745cd0591bbe410fffec4d0ced7d58b844090da267e7da15348
iwl6050-firmware-41.28.5.1-110.el8.1.noarch.rpm
1174de416e10dfac15f61ea201d8f54c2da2d71725d8bedcc0cd8daca3a41bb0
iwl7260-firmware-25.30.13.0-110.el8.1.noarch.rpm
2986a3d51b14030af76e3fbe72208d266a3c6ae6afee4af5b4a94eb448b3b043
libertas-sd8686-firmware-20220726-110.git150864a4.el8.noarch.rpm
23ad7de4d4084fecd2719465ac68dd0fc87a09e6a02dd989e63dc8246a127752
libertas-sd8787-firmware-20220726-110.git150864a4.el8.noarch.rpm
8044c8712188cc19e15f04d2d8ffa9829cd3df1f267c8da9ffb4004ab0132b0c
libertas-usb8388-firmware-20220726-110.git150864a4.el8.noarch.rpm
3de6570a0cbd700a823a5f1a9a2b495e8a26e451517ddb97f5bdbdeb57f0a6c2
libertas-usb8388-olpc-firmware-20220726-110.git150864a4.el8.noarch.rpm
32493d237acfe25379667ad067edc6306413783fee195ead85258ff95beec859
linux-firmware-20220726-110.git150864a4.el8.noarch.rpm
a7e4b2efa8026d94832457e29367e854b7aa7e98c4a6adaf1402dd0be61ae2c5
RLBA-2022:7743
autofs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
autofs-5.1.4-83.el8.x86_64.rpm
f464f194cba239cec02c8af19f2b8c1e61efd86fc5a00915366cc305c40f3767
RLBA-2022:7744
tboot bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tboot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tboot-1.10.5-1.el8.x86_64.rpm
fa9d5d70ba14a39aff185d879f2a76c3253de6bb141803093f972cdcb3fc9b64
RLSA-2022:7745
Moderate: freetype security update
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404)
* FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405)
* Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for freetype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404)
* FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405)
* Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
freetype-2.9.1-9.el8.x86_64.rpm
1f82bd400e0ebd592f64347968c0ae85970230f51bbc8a2e49cf10a08f88526f
freetype-devel-2.9.1-9.el8.x86_64.rpm
f299047e3abcbd68a1c1503343adad11e59bd4e7d0e0bb0edee3e2b78f0f5ab8
RLBA-2022:7746
zsh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zsh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
zsh-5.5.1-10.el8.x86_64.rpm
84cf7d7e905e02bcbd6ecebdf426c8d93f065ea402e181a4457bb62d02279374
RLBA-2022:7747
tuned bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tuned-2.19.0-1.el8.noarch.rpm
8e8428e5485fd6f6db1417c72f7dce9ad3115424e79e6df675b4b3f5f9846679
tuned-profiles-atomic-2.19.0-1.el8.noarch.rpm
a88e4f30555962ab6e526a8e9e1910c7fdb07d208f162f40163134c03adb7cc5
tuned-profiles-compat-2.19.0-1.el8.noarch.rpm
2fa950728ee6e10b81ce23f9a11702388d0f78137e31644908e94a84f422b4dd
tuned-profiles-cpu-partitioning-2.19.0-1.el8.noarch.rpm
38d1470f454154f2fa1258fd042ab28abf7120b3bf2cbd6c9f147395b6add489
tuned-profiles-mssql-2.19.0-1.el8.noarch.rpm
9165bb6a4d2368005ec46773703e928dff9c64669370e8cad67214a626a6caf8
tuned-profiles-oracle-2.19.0-1.el8.noarch.rpm
1d51c3da8674233ff884f936846f25d795f3d2345a81459853634a5752b2d9e0
RLBA-2022:7753
ledmon bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ledmon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ledmon-0.96-2.el8.x86_64.rpm
440d04929f122cdceb5a78df0f295423a85350ba8c41e3b8cf339aa2e14feaf7
RLBA-2022:7752
iproute bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iproute-5.18.0-1.el8.x86_64.rpm
16d15715ea84fca1abb50b1fd8b9aa31947f394a8e5ae6a0c0e609fa832ddf05
iproute-tc-5.18.0-1.el8.x86_64.rpm
52e2c0a8aac52bbc2d47c767509a749b900e4114a73b67485824c79a61349c7d
RLBA-2022:7754
environment-modules bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for environment-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
environment-modules-4.5.2-2.el8.x86_64.rpm
e29e1480f2d38fdbac6d3862e4ee3e4ccd4370965ea4a43c8eb3067659a98149
RLBA-2022:7755
microcode_ctl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
microcode_ctl-20220809-1.el8.x86_64.rpm
c85e7a453ac15e05f9f3c4b5ae8508f8c7f8e940259d160d3874c431f9a5335f
RLEA-2022:7756
python-rtslib bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-rtslib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-rtslib-2.1.75-4.el8.noarch.rpm
d60cd075dbaf1d38752921078ed51980f4f8e1514fcd858de9f30d2dccffe397
target-restore-2.1.75-4.el8.noarch.rpm
fd3ee14675eb7b215e5ec44ed958fbe2647eaf9615fc348ece11375ebaa99b85
RLBA-2022:7757
sg3_utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sg3_utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
sg3_utils-1.44-6.el8.x86_64.rpm
d1fe4e43ef3940d25003839ab92c509c3f2870af90e3581e3c3987d7ff3651d3
sg3_utils-libs-1.44-6.el8.x86_64.rpm
d5323bca03b3995dc94df82603cea33abc86f88074b7d6af8c9b052327711c98
RLBA-2022:7758
coreutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for coreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
coreutils-8.30-13.el8.x86_64.rpm
85c43e908f5262db2ea4f1ee1076cb0afd54b68386626ab0f2f57292859b07ad
coreutils-common-8.30-13.el8.x86_64.rpm
c1b73d361d50078615825ab34bd793e1c69729b7be8151ddd88923a7be42ba75
coreutils-single-8.30-13.el8.x86_64.rpm
10b075817dbc618fcdaf76c4d10b73af4b9bc780442680bd53fc707a7bf63862
RLBA-2022:7759
dnf-plugins-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm
f289b75df81b2d9ad9933b59b05c546239d3def15d0ee3182b9e9bdfda0ca34f
python3-dnf-plugin-post-transaction-actions-4.0.21-14.1.el8.noarch.rpm
32c2dfc400c7c6e21792d9409b37aca81ab3577e611873017df164f505d1c8e9
python3-dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm
3ea9ee75f9402e4d86a5b21828a0a49e933508de2b60ae2803eb7bfbd7d31b21
python3-dnf-plugin-versionlock-4.0.21-14.1.el8.noarch.rpm
e3b7dd311d9d0cc78f7aa964edf8e0a8cbe482dd58c82279b55486daf009d973
yum-utils-4.0.21-14.1.el8.noarch.rpm
8250e9f58056269892bcad80f19fa592c670e47a047082892e452f9b5ea91169
RLBA-2022:7760
ndctl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ndctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
daxctl-71.1-4.el8.x86_64.rpm
2db009dea46521fec1f0577eda6d5bdc455ba5f0c0b046ef96ea91148e38dd42
daxctl-libs-71.1-4.el8.x86_64.rpm
5329ad794133c3dec1d26aa770f71753f92f9bdd2887366537158cfa4f30add5
ndctl-71.1-4.el8.x86_64.rpm
e908cb04d30da21e4fa19e57b7a71c34fcb774227592513ea0f59a73b87506a8
ndctl-libs-71.1-4.el8.x86_64.rpm
fef989ff9e52a591cf223a073bbfdc478784be0537f442a1702cbeea7297cb5c
RLBA-2022:7761
fuse bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
fuse-2.9.7-16.el8.x86_64.rpm
1dd36ef3a8ac86ff704d22a239ded8375bec1bc91dc5b85bef89b5c795830ef7
fuse3-3.3.0-16.el8.x86_64.rpm
65463d967fd88bbb6be60071c6ca269acc1b4c9cebbfc0d27fa4cdd9672f09ec
fuse3-devel-3.3.0-16.el8.x86_64.rpm
21437e23958cdc9fdbef7cd71e45b76e9403a8139ea391cdb37328cdcbdf7819
fuse3-libs-3.3.0-16.el8.x86_64.rpm
9246992726f5febcb356dc31578003625fc5f950870c0945a97c010b63654b26
fuse-common-3.3.0-16.el8.x86_64.rpm
14178b8cadbc6444e9d2c91b73e54dbccce3e09091580e090ff0e93cb660f097
fuse-devel-2.9.7-16.el8.x86_64.rpm
af93907c9020c31aa6ef34c9909b174abb833a74549ee136295d0d2b2a0f99f4
fuse-libs-2.9.7-16.el8.x86_64.rpm
e75da9286b4da0a4a98e3703d3f9fc0e7d6bf743d00fba521fc0c0fe8f2cde28
RLBA-2022:7762
hwdata bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
hwdata-0.314-8.14.el8.noarch.rpm
f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343
RLBA-2022:7763
openssh bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
openssh-8.0p1-16.el8.x86_64.rpm
d7e4c2fb9945d5b508fd1ee38af8d49cde049aa8715272e8ccf9354073ade17d
openssh-cavs-8.0p1-16.el8.x86_64.rpm
0523fa2cf4171bfb8428ce395a8f7b86153afae590795c512ef341bebd387b9a
openssh-clients-8.0p1-16.el8.x86_64.rpm
8911d46d560ae4f55a48415d21b5940f0149a0182a1d69a35281048a6ca7c982
openssh-keycat-8.0p1-16.el8.x86_64.rpm
8e9a3a157cd39709e59f7a9fe6665fca89a020a6880615d7ce2c2543de5b9ab4
openssh-ldap-8.0p1-16.el8.x86_64.rpm
e67e85c3d0a6258e8c686d0719c15e8ffbdd3cea0b64e2818d20596219f3a3e1
openssh-server-8.0p1-16.el8.x86_64.rpm
e64ec8be2351169746bc1fbcc7071bef420d7f46c85f4c43fd6de43ca63ef76a
pam_ssh_agent_auth-0.10.3-7.16.el8.x86_64.rpm
3b72e9cee581fcf2872cf76c018182f6ba8494bc2ee7e9daa8ebd617dfb234e8
RLBA-2022:7764
kpatch bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kpatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kpatch-0.9.4-3.el8.noarch.rpm
f015d9416b817158f4ebec7c421dfa4c3966e1226934aa621291ae5e6ba14f3b
kpatch-dnf-0.4-3.el8.noarch.rpm
37135ce718031624a4e063a1279bcd8961fe8672f9aa31d735400e1e96f747bf
RLBA-2022:7765
ethtool bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ethtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ethtool-5.13-2.el8.x86_64.rpm
dfd42cba11f7a7a68d45bf7e992dc9d8df69acb699d7738a9bf8d0e37c48d0aa
RLBA-2022:7767
libbpf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbpf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libbpf-0.5.0-1.el8.x86_64.rpm
6804db28d9db3b20c42e00dd248b7853c599850755b02898a60ba7d5e0fb40a1
RLBA-2022:7768
nfs-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libnfsidmap-2.3.3-57.el8.x86_64.rpm
e89a1e7f45e931d6c5f9e50ff8bd15b5e211bf118ca1582cfde176ab3f45a609
nfs-utils-2.3.3-57.el8.x86_64.rpm
1cd56d017048cd5cf25dadddcbe2df1d553628f5eeaeb3322c1a4d18e8ec3210
RLBA-2022:7769
dbus bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dbus-1.12.8-23.el8.x86_64.rpm
ab9ee1bc5bd4c2840f088dc61e995eca2c1eec444cf5df7c10fa5ac722e62068
dbus-common-1.12.8-23.el8.noarch.rpm
58d1cd7b3c07140cc19a76f6d548bbdd99ff5917de84efd15693bca0561e8cb5
dbus-daemon-1.12.8-23.el8.x86_64.rpm
4c1b129a8eaeb98a754b5317f4cb9ca17c82f655a1024b9230c87564c13e4683
dbus-libs-1.12.8-23.el8.x86_64.rpm
abeeaa5229c12c1612929559f003ce6d1417517ec2c864a82a3ddaa11d89a207
dbus-tools-1.12.8-23.el8.x86_64.rpm
36feaaf227c012cfbfc2ce439d05a222a4a34b082c24c7d8698fbc9453d24fc8
RLBA-2022:7770
tar bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tar-1.30-6.el8.x86_64.rpm
efab98a8bb9651748a93b495425c0d17dc6c1da850b0d30872d4729a0ec34bf1
RLBA-2022:7771
device-mapper-persistent-data bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-persistent-data.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
device-mapper-persistent-data-0.9.0-7.el8.x86_64.rpm
044f1aaba91ba9d2c90f8531789d2fbd60799f01526c1a5217dcb3640830b785
RLBA-2022:7772
smc-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smc-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
smc-tools-1.8.1-1.gitbbf7e8c.el8.x86_64.rpm
7241ee64d7d1b6889a6ae5166ef3c0e5214ec78bbf99e28fe7b9e88068e01c34
RLBA-2022:7773
setup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
setup-2.12.2-7.el8.noarch.rpm
e470141a5e3db486e3c26d6d071677489888b09e703093d3f59e22e30b92e155
RLBA-2022:7774
sanlock bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
sanlock-lib-3.8.4-4.el8.x86_64.rpm
e1724861f92a7541935abd89c970f8061e71dadb0039012c2b09d012315792b8
RLBA-2022:7775
libnl3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnl3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libnl3-3.7.0-1.el8.x86_64.rpm
d00c37fd814a045c8c326c5b0536bab368ec26968df7e9e78be20d69036ce822
libnl3-cli-3.7.0-1.el8.x86_64.rpm
34182d7931963bb255228c6848dc424f1e625c9ed14856845e2f89941d41b95a
libnl3-devel-3.7.0-1.el8.x86_64.rpm
5ae6118352b477eb58fd56b912285d2570e1b229e7452c15ffa0c576c26e23dd
libnl3-doc-3.7.0-1.el8.x86_64.rpm
3bef795f0918019528d4afd733a5c35a52d7fb853eb17b1a5d5ffe44c8786be2
python3-libnl3-3.7.0-1.el8.x86_64.rpm
19371d7a59cd21f139d69c82d8629d86435c804933a150475b1cc7c2c43db0c0
RLBA-2022:7776
libverto bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libverto.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libverto-0.3.2-2.el8.x86_64.rpm
710a6b9deeb18e8e2972bc6738cd1ac9403c60bc5c2a83c6229be69075aa0a4e
libverto-devel-0.3.2-2.el8.x86_64.rpm
85586f38601b774aecc92dd4120d3ea30a3ebd76a6230d9d837b9a5568f8f683
libverto-libevent-0.3.2-2.el8.x86_64.rpm
13f0a8a52f183415653de09d4d477ca5f9d6c56607907a2a700e68755a503030
RLBA-2022:7778
kmod-kvdo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo, vdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kmod-kvdo-6.2.7.17-87.el8.x86_64.rpm
2ee09279c8ea781c9de5b302b306faf283f5c9f4624764300f97950b8ca444d2
vdo-6.2.7.17-14.el8.x86_64.rpm
2e0cb47cf000e908c58b4c2d00ee7bb85423d221a01aadc1d0a71ddfc0cbd229
vdo-support-6.2.7.17-14.el8.x86_64.rpm
104483d8f3a77961955600b48e11ac27982f3f8c7bcad2e73cb42239892afa0d
RLBA-2022:7779
curl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
curl-7.61.1-25.el8.x86_64.rpm
325023f3237487450b5c5e99b372de6c03bf1bdb7edeef0c5285f6623c0c042d
libcurl-7.61.1-25.el8.x86_64.rpm
89d300df2a78b12e95873a29e498cc09915845c7ff81c9014517596b33adbd0a
libcurl-devel-7.61.1-25.el8.x86_64.rpm
e08ee177b14f2354e560f60c6e4b6fe937083561734f440ee25acfcb62c3a7fd
libcurl-minimal-7.61.1-25.el8.x86_64.rpm
e6df6651340a2b6bddcf150b1128c42aea45ba0cde44878e3b7b8644381a2047
RLBA-2022:7780
librepo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
librepo-1.14.2-3.el8.x86_64.rpm
156746e163f17cd7d79818e9cc14e2ed0c9065dc150d7815bdb2f705d54ce7ff
python3-librepo-1.14.2-3.el8.x86_64.rpm
924fd2e18a17401a53349b42708d0e54f261eb125e9bceba86733ce569da0353
RLBA-2022:7781
gdbm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdbm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gdbm-1.18-2.el8.x86_64.rpm
0101595236571d8dd468551c0f95777ec232bcc84c2fe197b4f251d85c90346a
gdbm-devel-1.18-2.el8.x86_64.rpm
d75c1167d87edfc167b8072d2afea4317338b725b7bc04ebab7808b25cbefd0a
gdbm-libs-1.18-2.el8.x86_64.rpm
dd0f839da095f72e05136e59de39e42be7034358f352b8fef632678c5d7416be
RLEA-2022:7782
strace bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
strace-5.18-2.el8.x86_64.rpm
1e631e0f63c4e6fd898d0ab6c416f10002ee49bce280ccaa79cd74ec7e9b15be
RLBA-2022:7783
util-linux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libblkid-2.32.1-38.el8.x86_64.rpm
b66111077572921fcad790fda05e0861e04cc7588d45ef2ee1769056c55f49a1
libblkid-devel-2.32.1-38.el8.x86_64.rpm
f2139bd977427d66938bfa43f46f9d8c2ebd00ef55df3c0d92910c40c0ec760b
libfdisk-2.32.1-38.el8.x86_64.rpm
b7dc8609548bb5b36a5baa6d7cb7d853bd83440e9f0b08dd53f24d735f42043b
libfdisk-devel-2.32.1-38.el8.x86_64.rpm
0ff823161e4e0697cb03e6a4f1139cc2ca1b377b0cdccdc3e636da37d358262f
libmount-2.32.1-38.el8.x86_64.rpm
05edca78074a0ac2ab06c76a2bff252594783d2d91049e0702077a1b83a8dfa6
libsmartcols-2.32.1-38.el8.x86_64.rpm
a3b1b7735ab0ded07cc2764478e9a0c473c1dba79dc6899676ea4fd054b8999f
libsmartcols-devel-2.32.1-38.el8.x86_64.rpm
259c78dc4de17753bdba24d694746a3fef12e50ca48ab7e95b6cbc13502a5464
libuuid-2.32.1-38.el8.x86_64.rpm
031688455169a37c3dba3e95b3aaf3bfce49582f7606ea234b5aea9ad50fe4d9
libuuid-devel-2.32.1-38.el8.x86_64.rpm
c8d68ff48762cfcf73bb888e13f54a9fedf4151c85ff426ae09d494d4425a1ad
util-linux-2.32.1-38.el8.x86_64.rpm
96e990f0a0dc107325b5584ba06ea201db8fba2b7bf9f23ffe2ad0b6a41d9b43
util-linux-user-2.32.1-38.el8.x86_64.rpm
1628cba8e3975a9bd17b9a50ccff51ae1d922aa4b350e22d150bc537a4a9bf0d
uuidd-2.32.1-38.el8.x86_64.rpm
995450a2fee330947120b0ef2a23d4d2a5627d1e58c403c3288914c3dddeae85
RLBA-2022:7785
nvme-cli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvme-cli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
nvme-cli-1.16-5.el8.x86_64.rpm
641f73e6bb125148b6f5912ddb15a0b9959c8819e67333fa51d401a0e39fa41d
RLBA-2022:7786
libselinux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libselinux-2.9-6.el8.x86_64.rpm
423470c18dd1ad6a879cde958e49eef317fa355518fc6429c89e575470a2a032
libselinux-devel-2.9-6.el8.x86_64.rpm
608c9f979b4902a2b459c04cce7116ee66bc47ba4d2fd350b3bfb421b2569a67
libselinux-utils-2.9-6.el8.x86_64.rpm
0302c3f0ef5abbec721ed4190df66398201bdec081b7174d8a3fbb08af2a38de
python3-libselinux-2.9-6.el8.x86_64.rpm
2d901998c4c6d5e349e3ec24ce937a8afa70ea7a19a1c4e8021965d2c7f69b03
RLBA-2022:7787
irqbalance bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for irqbalance.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
irqbalance-1.9.0-3.el8.x86_64.rpm
48e013d3431e850695e3c2119a5b2990938b05433024c680adf145893b8a6af1
RLBA-2022:7788
libarchive bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libarchive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bsdtar-3.3.3-4.el8.x86_64.rpm
60dc3f9c516d80b1833501d71cf7699076f677678edcdcaab7af11170f93553c
libarchive-3.3.3-4.el8.x86_64.rpm
0253d5d22ad86d07bbcc9d7f58eecfa107aaf82b51f55fa479443504d8d67c14
RLBA-2022:7789
dhcp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dhcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dhcp-client-4.3.6-48.el8.x86_64.rpm
fe55adbc8c0cfc4a2f34f6154677191356a4c1b7782ccbf0d7ce7d4403e189c1
dhcp-common-4.3.6-48.el8.noarch.rpm
e13712a0dfd2a88079f47a1507913848a61e238fc82e60d20c863c7a1594124f
dhcp-libs-4.3.6-48.el8.x86_64.rpm
f3e8f4377a036846400a0e154b909a5e386572f8cded19aa1224605c76589da0
dhcp-relay-4.3.6-48.el8.x86_64.rpm
0da139aab0f7af5130c0740522718c4f481cd8dbffa44113c58cbc4c8192a0e0
dhcp-server-4.3.6-48.el8.x86_64.rpm
ba6ef796723829517985e83629c2b7fdceaaf3f499d377de48a2851d2a3c4bae
RLBA-2022:7792
lvm2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
device-mapper-1.02.181-6.el8.x86_64.rpm
cdb9e1ea18556615608aabd0438080ba1e8fa1570d648995a5e0b8e59f67de58
device-mapper-event-1.02.181-6.el8.x86_64.rpm
68cca29505970555116252762305b5f9b731b07f3ffb6d227a6496a68fed6a7b
device-mapper-event-libs-1.02.181-6.el8.x86_64.rpm
05bb1f60bc250e7ea7e136c6a3dc8303480f192c45c9503921a0431d7cd6a692
device-mapper-libs-1.02.181-6.el8.x86_64.rpm
4a00d9b4ef66d7fdc814014c171b55f0acd4cb9c1f6382d209404dd27155fbb6
lvm2-2.03.14-6.el8.x86_64.rpm
95acc19f606a237a4938deb6ddbb7cf1aaccf05038d9877dcb684fd4c6ef881d
lvm2-dbusd-2.03.14-6.el8.noarch.rpm
2c066ef7fb9501e667b432d9a0d6dd02d4f161695de7bbd3e66530a654621db5
lvm2-libs-2.03.14-6.el8.x86_64.rpm
038e02edeb320c8d7eb32e8e3bbc430cfa9e108366e857ea752af8aebfdb52fc
lvm2-lockd-2.03.14-6.el8.x86_64.rpm
1e9e147a17515d42774f73f03029df0dff4be7c69d8b73315dc057141fd9b7b0
RLSA-2022:7793
Moderate: rsync security and enhancement update
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
rsync-3.1.3-19.el8.x86_64.rpm
485d93c8b35fa83c50acc71fb4b8f6313f4241b1c940a94d3b2ed7d55ac52c82
rsync-daemon-3.1.3-19.el8.noarch.rpm
3c1e198412a68878c3ce5e1c516ba4b700a0eda6ee00e63eaace2e467b5b0edb
RLBA-2022:7794
shadow-utils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shadow-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
shadow-utils-4.6-17.el8.x86_64.rpm
8e9343148d8c00c2b88bf3a5140ff5a6864cbfdc5d84a043aa0bcaa5057f9912
shadow-utils-subid-4.6-17.el8.x86_64.rpm
7d89b766c6e153e62d95d73836d908f0a3350cf6332f679f6da006fd06915d1a
RLBA-2022:7795
gssproxy bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gssproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
gssproxy-0.8.0-21.el8.x86_64.rpm
c26e6967b01c674a95f25d9f4a17ee45e2a44787bfff580ee7e7d3dd80cfe767
RLBA-2022:7796
iptables bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iptables-1.8.4-23.el8.x86_64.rpm
90be5c35287cb2a091ee668de356b878e0fc05296b8bafc946bfebb2beca90c0
iptables-arptables-1.8.4-23.el8.x86_64.rpm
8dbac2dfa89da6102a3a089ff10a68d4481378a0540a3a7f8988959e046338ad
iptables-devel-1.8.4-23.el8.x86_64.rpm
6b2476d8e16da9a51627ef25038853f2cfdf4b71d0f1c4de1988d562020a5a62
iptables-ebtables-1.8.4-23.el8.x86_64.rpm
ae9928b04d3114a4dd309a0a3f83297f9fe48cce260cd659ab1c6723366be635
iptables-libs-1.8.4-23.el8.x86_64.rpm
8183dbd14af2f4d4c0565a7a35fbd7aee8f0ec7fbc8ea9f771f1e35b59d48f44
iptables-services-1.8.4-23.el8.x86_64.rpm
bed714e31076aec37fe5051bbe40ba22865eb14d60bbbc860e438caf697ef3aa
iptables-utils-1.8.4-23.el8.x86_64.rpm
c7e79600566d67c1be9482bad8279a802d1ff9c7f7db3be4b5024a0d99ccb301
RLEA-2022:7797
RDMA stack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ibacm-41.0-1.el8.x86_64.rpm
ea98632e58d4a819264c1f65caec0579fbfed0a4e8422e7d59d0471dee4ebbf4
infiniband-diags-41.0-1.el8.x86_64.rpm
c0ca319daac1ba7258b15b8c1100755d024628b263c2be05128c9d3fcd60a64e
iwpmd-41.0-1.el8.x86_64.rpm
251d14b43d463fea2c2b0762e34010511fdcbd422f7af59aaa845ecbff8560a7
libfabric-1.15.1-1.el8.x86_64.rpm
642ca45a7f9d2bcd71ba9259ffaeafec7dd295cab28b525f6025f8d127935092
libibumad-41.0-1.el8.x86_64.rpm
9f7ecc14fc7c5dfb5f209f47f044e39eac739c18b7ad1e58d471eef0972710c4
libibverbs-41.0-1.el8.x86_64.rpm
3475dfb56a09b2fa163582d734333c4b159f0aa20b0e035caea2d1be575b9d9e
libibverbs-utils-41.0-1.el8.x86_64.rpm
1218c5ba6414f18fbc91465604a6d4cb9d3b1fdbe1dac8b2a8718d52730fad85
librdmacm-41.0-1.el8.x86_64.rpm
97d3734c519bdda0317beb19432d97d69cdd939471ac3432331414d6db5e929a
librdmacm-utils-41.0-1.el8.x86_64.rpm
ed69cb24de0d5433bbb0288a5e37e31363323e5e7d367883ea4d12ab3f79b233
python3-pyverbs-41.0-1.el8.x86_64.rpm
f28e000b6f672c560cbd4186a2231d7e67b3de5e4f034ae8435d3a2491b1f5dd
rdma-core-41.0-1.el8.x86_64.rpm
aebdd77340d5319f8a53cfc00bdccf61170ead519381a1abe1515071093c9052
rdma-core-devel-41.0-1.el8.x86_64.rpm
cf756155e85ced149f6e83cfa3f6842b0af926f65221a935aa335fcc69f85134
srp_daemon-41.0-1.el8.x86_64.rpm
431b1a1d10739bd561d639afffdebf680bf0fa59b0328df2f14543ceb1741dd5
RLBA-2022:7798
initscripts bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for initscripts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
initscripts-10.00.18-1.el8.x86_64.rpm
6c0475cb1f7e0d3c7b6658f969e0a01d5935798888bc31da2b42e36acbcf4f2f
netconsole-service-10.00.18-1.el8.noarch.rpm
01a0b14c2c9286a8dddb8b86d432c0319feccbfbfd26c9e5a11aac1513d7aa6d
network-scripts-10.00.18-1.el8.x86_64.rpm
533302779b9f3be8acf89b05f4894406bc5452e87b50e424000467be92345f2f
readonly-root-10.00.18-1.el8.noarch.rpm
cdc79cf85b3769685f257187953ec57a5aa8bbd06dde1e28b832acbb5a5a2f22
RLBA-2022:7799
grubby bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grubby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
grubby-8.40-47.el8.x86_64.rpm
d9bcc2da7a8dd7f29bb15b413ad4ff9e3ab0ddf5b1c11fee90f1e188f10d4167
RLBA-2022:7800
tpm2-abrmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-abrmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tpm2-abrmd-2.3.3-3.el8.x86_64.rpm
52bf5ce4765fe3967f39695aae1e0b8d05501685d6248c494818cade9ea05f06
RLBA-2022:7801
memstrack bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memstrack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
memstrack-0.2.4-2.el8.x86_64.rpm
56e9e38fe7b34215f6b68f6729a14011a248ec43ed116413b8d1d70750294681
RLBA-2022:7802
liblockfile bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liblockfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
liblockfile-1.14-2.el8.x86_64.rpm
61157f747e39923f3a6ca2d1cbaa42b5c9ae3b6cb9786f76c997fd823f446fdd
RLBA-2022:7803
libtalloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtalloc-2.3.3-2.el8.x86_64.rpm
98ed813ca966e3024fa0fef669b88f583196bb4b135d59b6411587bf2fb1866b
libtalloc-devel-2.3.3-2.el8.x86_64.rpm
b94c9d0027f462c4e9a7c1c004e1606e0254694a30311b2ad2ad4537e9b9c9dd
python3-talloc-2.3.3-2.el8.x86_64.rpm
43ce0cae3c6db844d067bef17335961f2af11ae05e31290652c5ecd31f2fa5c2
RLBA-2022:7804
libsemanage bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libsemanage-2.9-9.el8.x86_64.rpm
d08e18048af1c5ad125356edc17d805cdac32f33a1db756339d292ae3bc93428
python3-libsemanage-2.9-9.el8.x86_64.rpm
7f7c7f0b08535b082dd4a877324453f56f4f5d977982751e1c0843b41be90af3
RLBA-2022:7805
policycoreutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
policycoreutils-2.9-20.el8.x86_64.rpm
e10c35ecc2d40a18165cc5e2352497e100982e16b141de1d4dc5b253f64846f6
policycoreutils-dbus-2.9-20.el8.noarch.rpm
7469bfbae4fe7597b05e5bf0af996be891c0603a2d20b2efa793b47bd850ca98
policycoreutils-devel-2.9-20.el8.x86_64.rpm
bbfe3f9ebeb2ff96a5aa29e98f8aeafcac8b25e6bb43a76612a9dd2a22de48d9
policycoreutils-newrole-2.9-20.el8.x86_64.rpm
b1a262d251cd9e8c7a54ea605d3e3afa9161928dd224e7443c352a66845b2e17
policycoreutils-python-utils-2.9-20.el8.noarch.rpm
4f48c6d787965dec6db81f43a20279aa0aa246002c02afa4ec719155890a0423
policycoreutils-restorecond-2.9-20.el8.x86_64.rpm
709a0e0e0abad38cfc8ce4960a2b9b56e32b0df312a170ea0d8c5d85dd20db62
python3-policycoreutils-2.9-20.el8.noarch.rpm
601dd458e26f2a412f2c7d0a9feffbc5f0bdbb2835186ba5880a6640d731868b
RLBA-2022:7806
syslinux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for syslinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
syslinux-6.04-6.el8.x86_64.rpm
004e1c6ccab4c1691baa99e0ef4a2fe70adf6a499766b6851525a57c614079df
syslinux-extlinux-6.04-6.el8.x86_64.rpm
58ef4e36ab3ff0b45f879498e3661bb4bd897dc9780d87604d7f1a4497a70ecc
syslinux-extlinux-nonlinux-6.04-6.el8.noarch.rpm
65380c1d03fbd9affa8c311635d895d8663e0d059f71c171363dcaa6a70a62af
syslinux-nonlinux-6.04-6.el8.noarch.rpm
aaaa5a716fc708737112a9e1946d0d09c6202ad407c93f56f769f97d13ed16c8
syslinux-tftpboot-6.04-6.el8.noarch.rpm
25ec61fb83f952c8d40fc9309126a9f37ad7acfe4f49ea4cce93757dd1288cc6
RLBA-2022:7807
lldpad bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lldpad.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
lldpad-1.0.1-19.git036e314.el8.x86_64.rpm
d57c3a25898358a3ad96d7c02fb9ef78dc669b3d4697a0fbfe3fee0cc6f46658
RLBA-2022:7808
file bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
file-5.33-21.el8.x86_64.rpm
b58d8ff9bd863b2eb2858c25755aecfec73f048b8257a832a33a43d3a584bf8d
file-libs-5.33-21.el8.x86_64.rpm
45678eb6e41623d2dee99e536fe20f23994460aa53fa05bb9d277dc721abe24d
python3-magic-5.33-21.el8.noarch.rpm
f2d3628e48e4c8a3e869939665ad34a0174deddd88e2544f1a203f19e0132d6a
RLBA-2022:7809
libpwquality bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpwquality.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libpwquality-1.4.4-5.el8.x86_64.rpm
11d928808fb7b434912fdb9320671f86f64364a9f6b4883a45bbfde9b9802f1b
python3-pwquality-1.4.4-5.el8.x86_64.rpm
76c71c2d7e731b33d879d6fdb701892c81b71d74e8cd20077a8157c11e6072ad
RLBA-2022:7819
rpm bug fix and enhancement update
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522)
rocky-linux-8-x86-64-baseos-rpms
python3-rpm-4.14.3-24.el8_7.x86_64.rpm
e1c16b79fce78de0cd225edb18baf4912ae103a4d1e4427ba48545f1e1442b7b
rpm-4.14.3-24.el8_7.x86_64.rpm
52ddb09b53c7fe658f11a5353fc090dace91285ec842e39a64d6e08627b2b278
rpm-apidocs-4.14.3-24.el8_7.noarch.rpm
a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b
rpm-build-libs-4.14.3-24.el8_7.x86_64.rpm
145ebac4456a0cd149537054ea74e323fd9eca548f38a40bd1725ac4eb9fb288
rpm-cron-4.14.3-24.el8_7.noarch.rpm
b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f
rpm-devel-4.14.3-24.el8_7.x86_64.rpm
8be76765b51d8681a9f76b209d07847c27b338fe25af2b0a149502ce5b5424b8
rpm-libs-4.14.3-24.el8_7.x86_64.rpm
fc4263ea61b68b93eda32fcde2612fea4537286f1e7e56fdd94db8eaae7faf8d
rpm-plugin-ima-4.14.3-24.el8_7.x86_64.rpm
e51a248c3608b07034f31451235312ce267e10c465585cbe633f900ddee1b0c8
rpm-plugin-prioreset-4.14.3-24.el8_7.x86_64.rpm
7eef6d9114e98909f304c2283325fc84afa6a3e22c794537eada9d1d164b53ae
rpm-plugin-selinux-4.14.3-24.el8_7.x86_64.rpm
0d071d4c4a26203c48961cbeb02d2b9c5b050e29d31c36cc9e11769c50c9cf85
rpm-plugin-syslog-4.14.3-24.el8_7.x86_64.rpm
2d4cb5df2e4c19d3a4d59100777475e0e94bc1e7ddf0daf1b7c1503765621eb8
rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.x86_64.rpm
ce1d5a7d9e8896e209eafb6142f22feaa70a2745e789a0b303e0dc8741fae778
rpm-sign-4.14.3-24.el8_7.x86_64.rpm
110d95fb5f5bf027f409ebe3ea455c1b3e387cde00645d970f5e716e92861e66
RLBA-2022:7825
bind bug fix and enhancement update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272)
rocky-linux-8-x86-64-baseos-rpms
bind-export-devel-9.11.36-5.el8_7.2.x86_64.rpm
9e7f239d97615ce9f2a312f081ef94b3e9ba9c9e4f987d22e298491506c0061c
bind-export-libs-9.11.36-5.el8_7.2.x86_64.rpm
35e6cd12f9d803bb60cfd7bf8a44ba73b8d0117432801d097d5851011ecd822a
RLBA-2022:7828
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
rocky-linux-8-x86-64-baseos-rpms
NetworkManager-1.40.0-2.el8_7.x86_64.rpm
2b70f077f0a14156c1fd2b39f9bfe7d8aa4f8824c531d0cec847948b9a309650
NetworkManager-adsl-1.40.0-2.el8_7.x86_64.rpm
37533da4a637e50dc0f2b007c0f8307e118a7b8859516725a5260c978a02943a
NetworkManager-bluetooth-1.40.0-2.el8_7.x86_64.rpm
1e4939176676a6d37e3298fd1eb8f2efa9bd475a5548ff4f41d979da06e1444c
NetworkManager-config-connectivity-redhat-1.40.0-2.el8_7.noarch.rpm
be319eb37936b7a8d6e4d5b5bd42e0fe336b107ce90c36bdd4d42cfaea003e7a
NetworkManager-config-server-1.40.0-2.el8_7.noarch.rpm
6e046436cc56ab9f86369ac70d9450227b31eecb9c9f8bd913b64b8987dcf1f0
NetworkManager-dispatcher-routing-rules-1.40.0-2.el8_7.noarch.rpm
195a4a4a8ddcd55676d48c91959b6341c437d274cc3aaf0a0555add408df8dcd
NetworkManager-initscripts-updown-1.40.0-2.el8_7.noarch.rpm
cda38500bd87db0d35acbce54b4272d1510cd0bfa02c646c83fcdcb48f0fa2e7
NetworkManager-libnm-1.40.0-2.el8_7.x86_64.rpm
c91c9ea40b1d7f9bf486ca3dff93d248e75b5e16728a22355a4d669bf44a0b0c
NetworkManager-ovs-1.40.0-2.el8_7.x86_64.rpm
f1f21c942b4bd73982bc674516fe7b0d66ba9466225b7b9d3f042c4fe532b91b
NetworkManager-ppp-1.40.0-2.el8_7.x86_64.rpm
87cce67b58bf84368cbe0d7646ebefc7e08b471e497adde50b6328711a3791e9
NetworkManager-team-1.40.0-2.el8_7.x86_64.rpm
79ee020f3613c5db71ddba0e8aeda4d348aeb4f31892944839a5c97e0ab87a31
NetworkManager-tui-1.40.0-2.el8_7.x86_64.rpm
c2fd558daf2c12f3850eff9c200e9a984d56457fce9c2c3ad2199b260484b5c8
NetworkManager-wifi-1.40.0-2.el8_7.x86_64.rpm
e1961b7dc96b48d5a236d00e1bf1cf6e18f2a6b0b3c98ae4329c63ef8b5b2f0e
NetworkManager-wwan-1.40.0-2.el8_7.x86_64.rpm
e1475eb16a6939449a3217c06097d13c834b797caf795a8aa8ec74f04377a411
RLBA-2022:7829
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
rocky-linux-8-x86-64-baseos-rpms
libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
2b0a25c49789fba2c51fd9ec52452072f2e540dd9d7e108d85926da97fe53a68
libsss_autofs-2.7.3-4.el8_7.1.x86_64.rpm
9315acfb31602e68f3108bbcf3ae1ce2284754d71999f0ccce2f030da526cfaf
libsss_certmap-2.7.3-4.el8_7.1.x86_64.rpm
ef2188a436ca5e742b9c7ff1bb048ed51970131b1b1dd15ba66a8a6ddb50ee6d
libsss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
2a5b2632a44438e860792c637b000391aa266103fce05495b7b415845565c8a0
libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
d56c119593e8255294782593a8752917121626d8f451d239a41ccd79238e01da
libsss_simpleifp-2.7.3-4.el8_7.1.x86_64.rpm
1c961919f1a87b3314da8e29abbf24be253b6209946abd4570ff308f891f6ae0
libsss_sudo-2.7.3-4.el8_7.1.x86_64.rpm
8002f4af2b3014313e0e8b0be0e367a5870d8ff2662a86d55644c1cefbf18c45
python3-libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
662f05c80a436c05eb93c64af5ec17a4cb40c5170887068289b4cac306d7b7fb
python3-libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
41b7414c44d384931919f598d0dccc3ebd3f354719f3394079255a88adc3561d
python3-sss-2.7.3-4.el8_7.1.x86_64.rpm
42f321023b133a14290644eeb23c93ecab5d51b3e59570d8b8162607b04ab085
python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm
6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c
python3-sss-murmur-2.7.3-4.el8_7.1.x86_64.rpm
01c7c36729533d921205ff7f39245aff781db0b5475fb4e672785819b9328bc2
sssd-2.7.3-4.el8_7.1.x86_64.rpm
5051d53ac5df96df4062b8004780b3134a770263c4add8e41a6361eaa7324e02
sssd-ad-2.7.3-4.el8_7.1.x86_64.rpm
d82edf19f57c16e16acb145dc7d29e65dd96d4921d7972903ae96bb5ce83f956
sssd-client-2.7.3-4.el8_7.1.x86_64.rpm
ab6de7cd139f88513de8ca2f01db4017c8428fa663cc899f7252de8348206c8d
sssd-common-2.7.3-4.el8_7.1.x86_64.rpm
079034e36153d700d1373ad5c6d5936fe07c89cca587d2c2e04401bc7ad5954a
sssd-common-pac-2.7.3-4.el8_7.1.x86_64.rpm
70d338dfcf7642581fe77829964f801ace4dcb18559f3f714f01f61b313a000f
sssd-dbus-2.7.3-4.el8_7.1.x86_64.rpm
b4ca2da01eed9e540352acec3c3e8303ed6b8f90585935bc7205cf1612e8d733
sssd-ipa-2.7.3-4.el8_7.1.x86_64.rpm
a35fb89b88eabb04e165a074adffcc6114aec1c7ae9d85841ef31be1f0c9df83
sssd-kcm-2.7.3-4.el8_7.1.x86_64.rpm
2c2087677022939f952339173ec3f8f231ee56703df47518ccbaf46fd9f3baa7
sssd-krb5-2.7.3-4.el8_7.1.x86_64.rpm
cee94b872835bab3b869702f8e33ea8021415d5f85a4fdc04dd707f84341cbfe
sssd-krb5-common-2.7.3-4.el8_7.1.x86_64.rpm
71440d5c7e8f05e82c5c7fd3ee1bcf18d62670d9512d1b427fc2f10ef02d1e68
sssd-ldap-2.7.3-4.el8_7.1.x86_64.rpm
5112e64c8840bdaa795497a68b734439e12872ec5dbf16e0f0ab905268e1f6f6
sssd-nfs-idmap-2.7.3-4.el8_7.1.x86_64.rpm
ae8eb40f7de0b69aa91ae2b3d2e5168d426cbfbbd9ca97809ffc4c02b9ddd862
sssd-polkit-rules-2.7.3-4.el8_7.1.x86_64.rpm
8ead8ea9bf4c7f89adf140b89a890ee59744b626e06e58a9b5c9a27fb1ec88e1
sssd-proxy-2.7.3-4.el8_7.1.x86_64.rpm
80bf29198a06a20202a7b2cde28f75f0057fdb5825e552e7db07a52e6ececf17
sssd-tools-2.7.3-4.el8_7.1.x86_64.rpm
ea27ca6015d9115cd01c78560d6b36db6daf4338aeaf74879d704c5a93da1bae
sssd-winbind-idmap-2.7.3-4.el8_7.1.x86_64.rpm
885103316f6ef9796189d9b294a9db757c6a52dde27ba7fecb7d249ea889453b
RLBA-2022:7884
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border
with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal
time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border
with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal
time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
rocky-linux-8-x86-64-baseos-rpms
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
RLSA-2022:7928
Important: device-mapper-multipath security update
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Security Fix(es):
* device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Security Fix(es):
* device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
device-mapper-multipath-0.8.4-28.el8_7.1.x86_64.rpm
750b85258e090af0345c48b148d575417c734c3831fbfdfb287d72f060d0109a
device-mapper-multipath-libs-0.8.4-28.el8_7.1.x86_64.rpm
426393f34ffa65b105d0bcd82b50b3b325dac2997f9aa5d82c2cd5cc6ec858d9
kpartx-0.8.4-28.el8_7.1.x86_64.rpm
9bb96ba65f577aa1e9f6dc33dacdeb59f656368e2279615300dc00a877751cc0
libdmmp-0.8.4-28.el8_7.1.x86_64.rpm
21cdea71f7a13c24348d823ad2a906afd19a3e684dc02f45b27ff4a70dcf49fd
RLSA-2022:8638
Important: krb5 security update
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
krb5-devel-1.18.2-22.el8_7.x86_64.rpm
0ec00ab66e767e8e963efc06ef45c6de5829b6a2be1c155bb37a65566434f04f
krb5-libs-1.18.2-22.el8_7.x86_64.rpm
d37db3d2284ba491b51cdc51b33de8a66c77d065a20a6c1c1c2cf3a9090ac692
krb5-pkinit-1.18.2-22.el8_7.x86_64.rpm
3e35a025f79cabb5ef48aecc1a2b27cd2fd4bbab8bb0954461e7e5cf2109b709
krb5-server-1.18.2-22.el8_7.x86_64.rpm
1670bb4a3d45a20f68faabf0eeae2ff04b5f30924276e8d375b785a727e279cf
krb5-server-ldap-1.18.2-22.el8_7.x86_64.rpm
08efd58b22a8f2ccc3adcf766ff7d88d57ebbb59b660f2a13f5b8bfca6c46645
krb5-workstation-1.18.2-22.el8_7.x86_64.rpm
2e43158f317bc4c691b4b75f441a549359c196366a15d105f2c32be86e5fbbd6
libkadm5-1.18.2-22.el8_7.x86_64.rpm
36cf1eabea81f5aa51d19cd5700ce90fba57a8ca7f0ebc8ed5a9de06ccffac6c
RLBA-2022:8785
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent
time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations.
* A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent
time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations.
* A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
rocky-linux-8-x86-64-baseos-rpms
tzdata-2022g-1.el8.noarch.rpm
808522f695bbe1b624724328f2ab6ff9a615a4220bb9611549fe67ccddcb383a
RLBA-2022:9028
libsolv bug fix and enhancement update
The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.
Bug Fix(es) and Enhancement(s):
* Transaction picks old build to satisfy dependencies (BZ#2151895)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.
Bug Fix(es) and Enhancement(s):
* Transaction picks old build to satisfy dependencies (BZ#2151895)
rocky-linux-8-x86-64-baseos-rpms
libsolv-0.7.20-4.el8_7.x86_64.rpm
f4bd3dd4a66488a33d2afee06700f0ce2edafd69815c802b81838032b9e79f52
python3-solv-0.7.20-4.el8_7.x86_64.rpm
bd33cc1f45bd8c1729958de030c24d5e34f4d91b5dfd4a014d19f8f967f8b638
RLBA-2023:0085
net-snmp bug fix and enhancement update
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764)
rocky-linux-8-x86-64-baseos-rpms
net-snmp-libs-5.8-25.el8_7.1.x86_64.rpm
70d627282616e376dca8fb04c521ebe212534c15eaad0b85d2c4aaa4f8c623cf
RLBA-2023:0086
opencryptoki bug fix and enhancement update
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059)
rocky-linux-8-x86-64-baseos-rpms
opencryptoki-3.18.0-5.el8_7.x86_64.rpm
81ed0241a7c7e8fcaa130ddc14217713b665f5dcc80ff661fa09c45f6e641915
opencryptoki-icsftok-3.18.0-5.el8_7.x86_64.rpm
c4c0a41d4fd4e846b086039d97b14681890e22509430b4c8215463ab6456a3c2
opencryptoki-libs-3.18.0-5.el8_7.x86_64.rpm
8a5c295d821738c6f685732e9e1901728688835a90fd5de5df57f18e811ad148
opencryptoki-swtok-3.18.0-5.el8_7.x86_64.rpm
8f64d5ba1a4b728e58bfc68d250f93ec73c34223dc15f3df80668aeb794b9902
opencryptoki-tpmtok-3.18.0-5.el8_7.x86_64.rpm
60147a15e8fcaef749eb8a444df7da3e1a6b200baceeff2f361d515d58d3f38b
RLBA-2023:0090
zlib bug fix and enhancement update
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336)
rocky-linux-8-x86-64-baseos-rpms
zlib-1.2.11-21.el8_7.x86_64.rpm
62fbf01029bb98f969d7c991f56f942533bb9262731ae6ec468f39eb25b30046
zlib-devel-1.2.11-21.el8_7.x86_64.rpm
ead04467e2ea0e435ca8356236bd273cfd74436fac21610e24e1ae65a688d868
RLBA-2023:0094
rsync bug fix and enhancement update
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Bug Fix(es) and Enhancement(s):
* rsync-daemon fail on 3.1.3 (BZ#2139118)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Bug Fix(es) and Enhancement(s):
* rsync-daemon fail on 3.1.3 (BZ#2139118)
rocky-linux-8-x86-64-baseos-rpms
rsync-3.1.3-19.el8_7.1.x86_64.rpm
b99a4736d732f9ff54b352fffeffb4a30efb86855a166b6aaaed6ccd0fab3c4d
rsync-daemon-3.1.3-19.el8_7.1.noarch.rpm
fb059776c3978eaa94acb4e4b0f7944756f454824eab3a3178764226c1d50fbe
RLSA-2023:0096
Moderate: dbus security update
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
dbus-1.12.8-23.el8_7.1.x86_64.rpm
c17880e007d8902d0513617e500be78658e6ac6faef85926926b1354e61dd3a8
dbus-common-1.12.8-23.el8_7.1.noarch.rpm
d0e4859f6054c5ea4e81571f6569cad02b9700981fb122d7e2f104bce4214d32
dbus-daemon-1.12.8-23.el8_7.1.x86_64.rpm
1f9531ea623c5fa9f09bca6fbd12dde50336be5dfe51555149f140714cf86697
dbus-libs-1.12.8-23.el8_7.1.x86_64.rpm
d86078baadce0e5ce0bc8ec52e446d2d1edb079e233e6488409ff190adb9ebb6
dbus-tools-1.12.8-23.el8_7.1.x86_64.rpm
3aa8722ad8a8f76baaefe8157f15059d37afa0a82a20f7624311b1758ac1442c
RLBA-2023:0097
selinux-policy bug fix and enhancement update
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762)
rocky-linux-8-x86-64-baseos-rpms
selinux-policy-3.14.3-108.el8_7.1.noarch.rpm
321ec9f773d2082212881711c4346ccd77ef92167a46cae8418da5d93cfe1452
selinux-policy-devel-3.14.3-108.el8_7.1.noarch.rpm
6f11096869a4305c31ef274c3bd2dfc1e89be4c3ce21ae09aaae8081480a6204
selinux-policy-doc-3.14.3-108.el8_7.1.noarch.rpm
d9d0cf27ff71a508cb6dda32bb99f2f51772b4f681002b327e5710d7d2c53ef3
selinux-policy-minimum-3.14.3-108.el8_7.1.noarch.rpm
2dde92278499e82d3ed0bf620410e6f398bfd921838cc53716abfaa292102ebd
selinux-policy-mls-3.14.3-108.el8_7.1.noarch.rpm
550c511de341ff9c24ea63e8ae9e8ac53b91b0e517ff3f417dbe6d7113794d7b
selinux-policy-sandbox-3.14.3-108.el8_7.1.noarch.rpm
1119c34c00aaeafcf37bea9cd8d2013bf26286ab651a6b069d53f2ff7410eeb8
selinux-policy-targeted-3.14.3-108.el8_7.1.noarch.rpm
72864ab192aedd31c706b240d261b637f2b9fdae98c0e7ac638579ea7402c42b
RLBA-2023:0098
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
rocky-linux-8-x86-64-baseos-rpms
NetworkManager-1.40.0-5.el8_7.x86_64.rpm
eec411750eca7cbf573724b65f37c146f2c913170b42568dd8974d2fb1cc1656
NetworkManager-adsl-1.40.0-5.el8_7.x86_64.rpm
1c156600595f9905b29944de6c4f111d4b17d60625eee81611cd0deac84bebe4
NetworkManager-bluetooth-1.40.0-5.el8_7.x86_64.rpm
1ff89568ddbb3c7fef529d2f4fc75aac12fbad32b7f4ff16017054e08669238f
NetworkManager-config-connectivity-redhat-1.40.0-5.el8_7.noarch.rpm
cd5378c72e78016a45d76be43a70202b6ede6826006fe1efe7762a3c00eb48f3
NetworkManager-config-server-1.40.0-5.el8_7.noarch.rpm
4d7c618d1898b37ae728a3fd4cf989463ca9fdf77041e567b60cbbac70cac043
NetworkManager-dispatcher-routing-rules-1.40.0-5.el8_7.noarch.rpm
9c4b87f46150a5d9751a10dbcb06a581d3acfacbe1075648ffbd2075f71ebc4d
NetworkManager-initscripts-updown-1.40.0-5.el8_7.noarch.rpm
c5c0347bd11f92b5a5cb4c618e04e1e631e69363c2ed4ff23cf4bd87c08d8847
NetworkManager-libnm-1.40.0-5.el8_7.x86_64.rpm
b4a7ecb20baa043deca6b5fbe151621b331518852a50c658e6f9f8f849932afa
NetworkManager-ovs-1.40.0-5.el8_7.x86_64.rpm
ddde2b40770cb2ef74e0c71bf05c9044eb1f8972d51990e0d6ddb37d90d1e899
NetworkManager-ppp-1.40.0-5.el8_7.x86_64.rpm
14cfc6d4d732ebd999803b49a069455f6257fdd84e2bd2fc1a2ba6dd47053c1f
NetworkManager-team-1.40.0-5.el8_7.x86_64.rpm
e74f6e43eb52a8e1de059b657ed924da4273f26ff41455a58d2f94503ad9a5e5
NetworkManager-tui-1.40.0-5.el8_7.x86_64.rpm
c0238998f5e4c5d9fe46e08e01c0236b829b612888552fcd2fa66a2f04f459ab
NetworkManager-wifi-1.40.0-5.el8_7.x86_64.rpm
8c6fdb3c20a01ffef120e0d538910b09c6bbb17524c2d3e223a5c97f42a2be8d
NetworkManager-wwan-1.40.0-5.el8_7.x86_64.rpm
17fa6f662e6e03a51a99d5a94c0b0d0ff67d92bc8ba1a3f6fc631aa76bdb7ee3
RLSA-2023:0101
Important: kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849)
* vfio zero page mappings fail after 2M instances (BZ#2128515)
* ice: Driver Update up to 5.19 (BZ#2130992)
* atlantic: missing hybernate/resume fixes (BZ#2131935)
* Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084)
* Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813)
* ice: Intel E810 PTP clock glitching (BZ#2136036)
* ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216)
* ice: dump additional CSRs for Tx hang debugging (BZ#2136513)
* ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270)
* After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205)
* WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953)
* DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216)
* Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152)
* Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878)
* mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957)
* net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017)
* Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583)
* AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218)
* Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374)
* net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130)
* iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081)
* Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742)
* Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912)
* Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849)
* vfio zero page mappings fail after 2M instances (BZ#2128515)
* ice: Driver Update up to 5.19 (BZ#2130992)
* atlantic: missing hybernate/resume fixes (BZ#2131935)
* Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084)
* Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813)
* ice: Intel E810 PTP clock glitching (BZ#2136036)
* ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216)
* ice: dump additional CSRs for Tx hang debugging (BZ#2136513)
* ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270)
* After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205)
* WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953)
* DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216)
* Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152)
* Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878)
* mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957)
* net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017)
* Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583)
* AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218)
* Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374)
* net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130)
* iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081)
* Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742)
* Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912)
* Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206)
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-425.10.1.el8_7.x86_64.rpm
870fe31369cee11ebea7bbbc1ded6f1f0ce94bbcbc08db360ecff02471590ad9
kernel-4.18.0-425.10.1.el8_7.x86_64.rpm
733ab5ce64e4e5a1c2485406abb3b7eee7b3b1d28cdcce124c22fd2c9e1f2387
kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm
5f88073317993ccc745d08d87c5ac76fe6cef8acc5d26a3b7349dd6b0d8f0669
kernel-core-4.18.0-425.10.1.el8_7.x86_64.rpm
0559592ef8f4de8cd61356b26deb24eeaa66b39e2db804610a508d6576627fcf
kernel-cross-headers-4.18.0-425.10.1.el8_7.x86_64.rpm
f91324f8849c5464d6b180856b01f7d92fb08303e4fd27b8eb4267f9b18ee46d
kernel-debug-4.18.0-425.10.1.el8_7.x86_64.rpm
fa7750c222eab7019e3cb84ffb92f276b7794091227a74e1dfe58717eb30cbce
kernel-debug-core-4.18.0-425.10.1.el8_7.x86_64.rpm
b998aaf08072c83b033c9fdfc007ec86536c64629fdbb6b654cb5a032e116b76
kernel-debug-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
95b0b6e900b845fcc325d1881eb6bb4fd6aa1934f6b613c5d380b630af9bc468
kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64.rpm
05a093e7b0d8f2974b36a2ca504e6c865d407d0e07a63334cd8a44b447cbece0
kernel-debug-modules-4.18.0-425.10.1.el8_7.x86_64.rpm
97a7a2d1fa37f333e3d662184b31dc61f7b13fc77f5c9c6ca5056bdaa49dd34a
kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm
a509585b03297af32782eef003ce694dfd1184407a2baf06451112625a8d3eba
kernel-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
f9d45da5eb768c0e5c89cc353337c62cadf3af528e9e7c186b15dd5dabb60aaf
kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm
a5841e7bb9d35f714ceaf835b19d2d07b9171354addf2353c43a3600bd0f1b3e
kernel-headers-4.18.0-425.10.1.el8_7.x86_64.rpm
1aaf20a790605e08336801ebe0639090e44e3c00c80873fe5e9b31dafd662d2d
kernel-modules-4.18.0-425.10.1.el8_7.x86_64.rpm
1c13477a8b745658af35fa366992b009744b0762fb978ba180eb806ef5967032
kernel-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm
66c10b1522c58c60077fa8e90e7b228b421f9cc7131c6c917595d80866c0e465
kernel-tools-4.18.0-425.10.1.el8_7.x86_64.rpm
04f9b25c9f30cc89485c38c8eb964d7a27e53ee83eb0a15eac26f8a6b05c2b20
kernel-tools-libs-4.18.0-425.10.1.el8_7.x86_64.rpm
2832e48280c73b77ccf99f28be2e036495fa393d6130dc0fcd24694d006e9ee1
perf-4.18.0-425.10.1.el8_7.x86_64.rpm
4464a8fde2e3c51b15ed5888e6b8bb2521c3617815b9d7f6bb1a4abc7aeb85f2
python3-perf-4.18.0-425.10.1.el8_7.x86_64.rpm
01dfecb23f710e29e31048ee306c8c79e0d63a6490be2e72ea15d97e98d6f713
RLBA-2023:0104
dracut bug fix and enhancement update
The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition.
Bug Fix(es) and Enhancement(s):
* booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition.
Bug Fix(es) and Enhancement(s):
* booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045)
rocky-linux-8-x86-64-baseos-rpms
dracut-049-218.git20221019.el8_7.x86_64.rpm
0d6987278adf8b37c2e2bb877d1bfbd9ad44074d3da20e5dde56d8bc19cb6707
dracut-caps-049-218.git20221019.el8_7.x86_64.rpm
f83f69a3dca9eaef1bee942c64c808899e40a74494d2eee3261ef581a5aee512
dracut-config-generic-049-218.git20221019.el8_7.x86_64.rpm
6db3a35458cce7bb2f170d4cdea9699d454b5c2eaeca4a3c8f923126060d83fd
dracut-config-rescue-049-218.git20221019.el8_7.x86_64.rpm
9e391599c846cae54d0ba11e42b081d1ea959ac0dca02ef3bcdbb990e7c06b29
dracut-live-049-218.git20221019.el8_7.x86_64.rpm
e216a054bdb694092012c2c0be40e469989174f2c783ff4bcd0327302f3bfd0c
dracut-network-049-218.git20221019.el8_7.x86_64.rpm
5303aa725437754296e8dbac8a0efbf47f1bd72784ded3fe366eb407eafae816
dracut-squash-049-218.git20221019.el8_7.x86_64.rpm
f18f02e40a70525f0b6cf73df191bb5e8b4a1f755c48dad9941e971ec37a1ece
dracut-tools-049-218.git20221019.el8_7.x86_64.rpm
2c4d582cc864a1ecbdf5b876df0518d9078f95fde95089e6f08e2251808bbd2d
RLSA-2023:0103
Moderate: expat security update
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: use-after free caused by overeager destruction of a shared DTD in
XML_ExternalEntityParserCreate (CVE-2022-43680)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: use-after free caused by overeager destruction of a shared DTD in
XML_ExternalEntityParserCreate (CVE-2022-43680)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
expat-2.2.5-10.el8_7.1.x86_64.rpm
9056a431ff2a53f8686e46007eea7f7247163d3e51bf0ac27af38b89c1102095
expat-devel-2.2.5-10.el8_7.1.x86_64.rpm
5ba825ef27e4e9ace75c9ebbff8754f76392d2e661f7f2d66b0cd7bc2474774f
RLBA-2023:0105
util-linux bug fix and enhancement update
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
rocky-linux-8-x86-64-baseos-rpms
libblkid-2.32.1-39.el8_7.x86_64.rpm
5dc2f6a4284d32818de3cc95f19e0845141b905ae07c7b2cc19ba6d96c6d9a74
libblkid-devel-2.32.1-39.el8_7.x86_64.rpm
3cab9c0e6bb556eae07bbd13a24c0774d854a5b73be0cd017f82f8c484be1338
libfdisk-2.32.1-39.el8_7.x86_64.rpm
933eab8a44284ab93d40a88996a7e9a8a1f75039466ddd2ff6c1092907100fb9
libfdisk-devel-2.32.1-39.el8_7.x86_64.rpm
d1bfc8f16e1b5a8ef7c033ad2ce84ebe4f8cc3e7367dd2398fb52bf0a7739cd1
libmount-2.32.1-39.el8_7.x86_64.rpm
db6225656d9d772838caaf6614b621f3aba4acf4401568aa0f0fbb26f53ff34c
libsmartcols-2.32.1-39.el8_7.x86_64.rpm
4e44ca814cca48b12bd7a23f875c26d0c9d10b30e7dc5d65b34a9d2be3039695
libsmartcols-devel-2.32.1-39.el8_7.x86_64.rpm
c8661ef0dee4c219f624b690a601d631dec8488e744348fe49cfaecacfab3108
libuuid-2.32.1-39.el8_7.x86_64.rpm
2eb19b756eebdef3e9a9f7f82e46e3689e9015f604c54d0bac0a70d58a967d67
libuuid-devel-2.32.1-39.el8_7.x86_64.rpm
468d08ad5f52e347473566e625002e3511c3b94da07dca536daf6ab40bc69e4e
util-linux-2.32.1-39.el8_7.x86_64.rpm
b0e4e9d1eb9d0c1b75b58e3d126c428009e0f43de0dcb4b4ccc30915721ba5ea
util-linux-user-2.32.1-39.el8_7.x86_64.rpm
aa1c3c0e6688c7362932387554577abb5308022e458a216812eeedde67dad0d7
uuidd-2.32.1-39.el8_7.x86_64.rpm
516bdce9592573866ad5c930f838322b93af315727388a38b442d14f2d81eeaa
RLBA-2023:0106
gcc bug fix and enhancement update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
rocky-linux-8-x86-64-baseos-rpms
libasan-8.5.0-16.el8_7.x86_64.rpm
01e7735778965987fd0d4baf7a738649f7a0700a7c9e5fe5e275ae22523ea9fa
libatomic-8.5.0-16.el8_7.x86_64.rpm
5de43e8039814083a1646492368e53fc262cec8f6a2026fced371b8e79d5f258
libatomic-static-8.5.0-16.el8_7.x86_64.rpm
e6118b15b39adff77ab74996f6894964b02b0946efb0d626496a52ea847b83d9
libgcc-8.5.0-16.el8_7.x86_64.rpm
223e66ce39231d96a83e219ca02b96eef3c25804a4f0f6de7e9ed5062816f029
libgfortran-8.5.0-16.el8_7.x86_64.rpm
776aef1c63d9a5e444f66bee2238465937167cdd39edc7f5aeb98b54944fee64
libgomp-8.5.0-16.el8_7.x86_64.rpm
b35a0924a06d8bdc38fb0ac9233bed6fc28b1a6705dafbcb2e58353a4d285134
libgomp-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm
84a3986c81659eb0bed37fb6cfa5cacb19e16079f1cb8f13e0c755fa7c1f6a2c
libitm-8.5.0-16.el8_7.x86_64.rpm
c9e4f8399ddbd0c3d34e2f11b14df72e8ef8eead715ecbf292829675fbbce3bf
liblsan-8.5.0-16.el8_7.x86_64.rpm
55515aaf8eb97dfbe9cd297113034b0f333d182b9a24a5cadb1ba0fd894a21b9
libquadmath-8.5.0-16.el8_7.x86_64.rpm
37356951646f3bd77a49fb8a0ff5b206c8c6354c4482ef56b040c8cbd22df50a
libstdc++-8.5.0-16.el8_7.x86_64.rpm
7a0f66da5d376c677914da8abe4700fd5abc496ac0769014ed32b3db8363425f
libtsan-8.5.0-16.el8_7.x86_64.rpm
6f9e715af8a477782ca552f7162028d11e8ad442867ada58aa35b093a36fc649
libubsan-8.5.0-16.el8_7.x86_64.rpm
ae7ec2db40c566b9b2eb278245bdd3309cb99dfbea8a5e13f2f170a3616e350f
RLBA-2023:0107
dhcp bug fix and enhancement update
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Bug Fix(es) and Enhancement(s):
* dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dhcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Bug Fix(es) and Enhancement(s):
* dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025)
rocky-linux-8-x86-64-baseos-rpms
dhcp-client-4.3.6-48.el8_7.1.x86_64.rpm
1ad76df6dfd776e954d0fab9914ec40419d2d3830d3d296821c48cd0be19a58b
dhcp-common-4.3.6-48.el8_7.1.noarch.rpm
f934465c675e5be123b5d7f7aae7c0e894b5cd6c6cd2e73c752655f8d295bfd8
dhcp-libs-4.3.6-48.el8_7.1.x86_64.rpm
a1a36c7c48f672b28f442f8b75fb7fe46bf1bb8ebfad86bf5f25b72d1960e107
dhcp-relay-4.3.6-48.el8_7.1.x86_64.rpm
edab0cab469cd725369b99dd91631bafc9e9c4d21928ce9e00ac42b0be8b393f
dhcp-server-4.3.6-48.el8_7.1.x86_64.rpm
7ec85283e999fc0eb1855650eeff30c3bf0fcefcc52d8588881c1f4790d13f7a
RLBA-2023:0109
systemd bug fix and enhancement update
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100)
rocky-linux-8-x86-64-baseos-rpms
systemd-239-68.el8_7.2.x86_64.rpm
2f9899eef3af510585836dcdf06eee68b8a0842697463dc214155b27f6137cda
systemd-container-239-68.el8_7.2.x86_64.rpm
7076302fd4aab59b9be0486635813640b7969421d17f9123b9954235b3ec18ca
systemd-devel-239-68.el8_7.2.x86_64.rpm
10606b2ae5a41f7e822f7c9df68018e5b710262ba7426840092c9eb6e4e1a27e
systemd-journal-remote-239-68.el8_7.2.x86_64.rpm
d433b03c864a1647aaaa30180df3de20856e0666f793356c67392dd2c8e313df
systemd-libs-239-68.el8_7.2.x86_64.rpm
866449a00878ceee913f5fe86156557a6a358888ef0f6ad63a933adbc8d31031
systemd-pam-239-68.el8_7.2.x86_64.rpm
518f0455435e5b800bb42362a2412440e86ebca16d1c6d6450e608d520acde1d
systemd-tests-239-68.el8_7.2.x86_64.rpm
c15ab85b1a9df37e129ccf3c9bfb31350178262852f1a26dbcdcdf92759d3981
systemd-udev-239-68.el8_7.2.x86_64.rpm
25a85109d922cfa15fc8761287eebf991a1a5ada085d6458f542b1cf27081416
RLSA-2023:0110
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
sqlite-3.26.0-17.el8_7.x86_64.rpm
da52f40c548a2cf17376d6f42f1f9bc0759ad20dd8cdba263f488d9d9b53497b
sqlite-devel-3.26.0-17.el8_7.x86_64.rpm
b93eca50687135f73465cd6b76c9f1965322bd652bde50f6195f8a7408c9bd76
sqlite-doc-3.26.0-17.el8_7.noarch.rpm
62de890713f95e66cecfbf4c9411060f95a3d58ba10b473b277294f7877ba70a
sqlite-libs-3.26.0-17.el8_7.x86_64.rpm
7048c7ef6e7b5926bf70a1b467010a9694beaa2ceaa69397033d2421ff83938c
RLBA-2023:0111
curl bug fix and enhancement update
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Bug Fix(es) and Enhancement(s):
* Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Bug Fix(es) and Enhancement(s):
* Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493)
rocky-linux-8-x86-64-baseos-rpms
curl-7.61.1-25.el8_7.1.x86_64.rpm
795124f1d1bddd0bc568f720e06bbd6788a4c7553fde4b5287c41e2152908c2a
libcurl-7.61.1-25.el8_7.1.x86_64.rpm
44e96dae7a32104d09ad7318327776b3efa8e7ccedc9ef9004ba3409bf51e786
libcurl-devel-7.61.1-25.el8_7.1.x86_64.rpm
87c20af4fc87fd7ab5c01221fd243a8c7f666feaf70e3422a1bcee7ec396299b
libcurl-minimal-7.61.1-25.el8_7.1.x86_64.rpm
231925f734309d069301aeb0358a0befd1d7798dd0f141b887638b6d415e0e03
RLSA-2023:0116
Moderate: libtasn1 security update
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libtasn1-4.13-4.el8_7.x86_64.rpm
698f540e70ef17aa66b99cfe52f953588a46ef65059a121df858530aa78fe12b
RLBA-2023:0120
authselect bug fix and enhancement update
The authselect package configures authentication and identity sources from supported profiles.
Bug Fix(es) and Enhancements:
* Change the default password encryption algorithm back to sha512. (BZ#2151229)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authselect package configures authentication and identity sources from supported profiles.
Bug Fix(es) and Enhancements:
* Change the default password encryption algorithm back to sha512. (BZ#2151229)
rocky-linux-8-x86-64-baseos-rpms
authselect-1.2.5-2.el8_7.x86_64.rpm
e95dc725c549f3233a1aa63b6fc8e0c3211eceaedf210c9248c4f145739dbfed
authselect-libs-1.2.5-2.el8_7.x86_64.rpm
5c0c29fd06e9ec99832db4fd1501e9d201ec08f32d0602d0388f34a8f9d42ee0
RLBA-2023:0121
libqb bug fix and enhancement update
The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling.
Bug Fix(es) and Enhancement(s):
* pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libqb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling.
Bug Fix(es) and Enhancement(s):
* pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300)
rocky-linux-8-x86-64-baseos-rpms
libqb-1.0.3-13.el8_7.x86_64.rpm
e0efd877528fd39ea990fa9997a11f27c657e7db9cf479f880fd027b7e53c16f
libqb-devel-1.0.3-13.el8_7.x86_64.rpm
45175558d9e110d856f88c1b6b5c8beabe6a870534b4a49a31ac2fa1a1ca689e
RLBA-2023:0124
sssd bug fix and enhancement update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
rocky-linux-8-x86-64-baseos-rpms
libipa_hbac-2.7.3-4.el8_7.3.x86_64.rpm
6b40647e7b80410117036e54ab13d4c1fcfd0feff168c9efa81cd7a294647554
libsss_autofs-2.7.3-4.el8_7.3.x86_64.rpm
2abe579c4ffdc56c97865c289d5fd1bf6d1299c4a3f455ff3fdff36dc9ebb705
libsss_certmap-2.7.3-4.el8_7.3.x86_64.rpm
f1e46e67ce2c8ba2384e624bbc16e888ac49023ae54fbe6e953814d6b4cb20ae
libsss_idmap-2.7.3-4.el8_7.3.x86_64.rpm
94666537c6621b86db022d639720f5e53822396cb3e192d80ee717bcf672b374
libsss_nss_idmap-2.7.3-4.el8_7.3.x86_64.rpm
c0d8498d901322fcc782c5a4eab3cb178c914e5fc116f239c83f490f604e35f8
libsss_simpleifp-2.7.3-4.el8_7.3.x86_64.rpm
b4c9570e3387cabec115e415799de32c218383f3f331239f62bc2af410d12dbd
libsss_sudo-2.7.3-4.el8_7.3.x86_64.rpm
1139edc554703c819058d09f04a3830db31f6c7f28e968937d7880bc0ef68ef3
python3-libipa_hbac-2.7.3-4.el8_7.3.x86_64.rpm
c4cd62b685bcf95b770178094d6860ed844979befa5d3500d18a7a00924fc70b
python3-libsss_nss_idmap-2.7.3-4.el8_7.3.x86_64.rpm
dfad347b627ba48abfa4e931827f0e1c795f3282e7a6c8c3188cda97e31d93e0
python3-sss-2.7.3-4.el8_7.3.x86_64.rpm
3e8763cfc3dd9adbd2b419368df54a093b64de01aa604cbe6cf6222593ebda47
python3-sssdconfig-2.7.3-4.el8_7.3.noarch.rpm
3f970ce3ad4b982366c148cf5018cc84fe95ef2806a4ace624ac1aeeaf83841b
python3-sss-murmur-2.7.3-4.el8_7.3.x86_64.rpm
61a7c08df8bef1cf1652468a740930975e4c52f0fb9da3f08263dfc353ecb43a
sssd-2.7.3-4.el8_7.3.x86_64.rpm
7c3baa320c7b740bf08bb67c55a9c790a6480f997b38e41e326d5e69608bfc12
sssd-ad-2.7.3-4.el8_7.3.x86_64.rpm
0e7992a19420b1bb74200ef92a139989ebf9b30b377f95ca6f7deaa03cc4bed2
sssd-client-2.7.3-4.el8_7.3.x86_64.rpm
f4aeb3e00faf97c8b2e4f6031709791eab6acc7681e4c575daee7d5f11effd94
sssd-common-2.7.3-4.el8_7.3.x86_64.rpm
d5a174d21352131d908f693cad3af713d20e5a15d8e6e2575976af4ad3031491
sssd-common-pac-2.7.3-4.el8_7.3.x86_64.rpm
88b2c379c74beb349f036be50d736a903770a9fbefa8b339cbbd867b57aa532f
sssd-dbus-2.7.3-4.el8_7.3.x86_64.rpm
0c886341fc961e0adabe7540c1ab7b194cc78f41f77aef306e022cbd9cd17d4e
sssd-ipa-2.7.3-4.el8_7.3.x86_64.rpm
92c10dc54edbf36335eb98ebd4dd07e2366c110d4f4cfb04953b4b6a45b2e670
sssd-kcm-2.7.3-4.el8_7.3.x86_64.rpm
64974f05f0da2a908b87df152ba2d30e1e576bf434057648e16f7a3fd851ad6d
sssd-krb5-2.7.3-4.el8_7.3.x86_64.rpm
7041c2128541b7698e3193e8df7e288af978afb95d13ce103579090c41a4831a
sssd-krb5-common-2.7.3-4.el8_7.3.x86_64.rpm
855a424d69ca18dd1449fbed49461a518bbc5aaa00c4be18464adaecffa7edf7
sssd-ldap-2.7.3-4.el8_7.3.x86_64.rpm
18d06837faec5cc53b9472935128a0e4e2339356a295572752ed9703c88519e4
sssd-nfs-idmap-2.7.3-4.el8_7.3.x86_64.rpm
e096e1bcbb2a958600e4e5654c6652d246a3f2fc140b95c24f1277d171998093
sssd-polkit-rules-2.7.3-4.el8_7.3.x86_64.rpm
c2d5b4f67b2b749328b760ac67f6797b741d2e887ab3fd35e73eb757ba3e3c89
sssd-proxy-2.7.3-4.el8_7.3.x86_64.rpm
c17e69a34bd8469ea6b01ed07a3c8c5be484bf99cb547d8a3edb767cda113965
sssd-tools-2.7.3-4.el8_7.3.x86_64.rpm
10f80f84bd2147fd7fffcf1edf600bd3819380dba6c5b4fd5a9f37b645dfcd24
sssd-winbind-idmap-2.7.3-4.el8_7.3.x86_64.rpm
6ac52a9c943338d0011231dd220b3ecf6ae7c8cc9394fbc1937ec5664af2aa9f
RLSA-2023:0173
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libxml2-2.9.7-15.el8_7.1.x86_64.rpm
e9a71d804fc627ec77aa50b455b5b94a33504adf93d4ba8ab8b1b8284cd95feb
python3-libxml2-2.9.7-15.el8_7.1.x86_64.rpm
2d53cb3dbc45a62369b67e8cebd1a83b13e85289c3ba3b3243f112ed6b2186ee
RLSA-2023:0284
Important: sudo security update
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for sudo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
sudo-1.8.29-8.el8_7.1.x86_64.rpm
99fd306e228fad26891792ff23712787394a9cff9907b6b82db5a11ffef4b5d5
RLBA-2020:4435
abrt bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-abrt, abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libreport-filesystem-2.9.5-15.el8.rocky.6.3.x86_64.rpm
cc21df056d6c76f8b9e583b2de81e63f00203365ba633c9491666603a23920cd
RLEA-2019:3448
perl-Net-SSLeay and perl-IO-Socket-SSL bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Net-SSLeay.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-Net-SSLeay-1.88-1.el8.x86_64.rpm
fbb313568b089de5d9ff74e54e509dc806e49d56bdcf1fd554dbe01ca5032ad4
RLBA-2020:4499
NetworkManager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
jimtcl-0.77-6.el8.1.x86_64.rpm
9425d08b19cba3fe5a237fa7eb581debd4858414fbd4d1e722f6575cbd957caa
RLBA-2022:2000
glib2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
glib2-2.56.4-158.el8_6.1.x86_64.rpm
61a796c05095a0c89ead008de79a522c0d50eff0d5870e7465fced706cf5d10b
glib2-devel-2.56.4-158.el8_6.1.x86_64.rpm
69c0db06fbc8f2d68cd970a4e245dd7a541cdfdd4cf44e68b13b833e207e685c
glib2-fam-2.56.4-158.el8_6.1.x86_64.rpm
4677c25392b7e27e30b0f125f412f6aac4266d9c5abe2ea35c276cd129389ebb
glib2-tests-2.56.4-158.el8_6.1.x86_64.rpm
688e3e378b0c12adbd0b4d5771e65fc15090ca07f6f5a4807e08728d9dea06fa
RLBA-2019:1957
python3 bug fix update
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756)
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-48.el8_7.rocky.0.x86_64.rpm
61e1bb3936eb62653e41f51499554d594a3891078c16238f92f0a17ff119cd53
python3-libs-3.6.8-48.el8_7.rocky.0.x86_64.rpm
f915967824e987568d9f023811caa9c4790487160a362438e9748f9bb5016531
python3-test-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e278462c08b9ad22433a1af437384c718821f2f060aeecec9123c7a3346a1a7a
RLBA-2019:3596
hwdata bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
hwdata-0.314-8.14.el8.noarch.rpm
f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343
RLBA-2019:3628
xfsprogs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
xfsprogs-5.0.0-10.el8.x86_64.rpm
7388b2eeaff6394491d86ee0437dee3d5bafba18a1c8a16746fe0fbedfa044a7
xfsprogs-devel-5.0.0-10.el8.x86_64.rpm
cbdba1a641ea361706fd28907e65cf4b332ab79c9e42ebae3f4b3a1e1b29deb0
RLEA-2020:4552
atlas bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for atlas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
atlas-3.10.3-8.el8.1.x86_64.rpm
0174e214cab14f4afd0b932a736cc085660ef302d6509d6b33b9f7fa78c5dbaf
atlas-corei2-3.10.3-8.el8.1.x86_64.rpm
5f5209bbeea5dddd8354fc5ddf8464c2026dcc3c5fbc833fbd1dd7b993a638aa
atlas-corei2-devel-3.10.3-8.el8.1.x86_64.rpm
8fc720a1f0b8a1ca54fe5ba31c19c8ad8915ebe828375d68441a3cd53265d7b6
atlas-devel-3.10.3-8.el8.1.x86_64.rpm
cfe93542853ac688548b90523511264c84e7c7fcd49831b3f7d9e724a2aeab89
RLEA-2020:5587
new package: kmod-redhat-oracleasm
The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library.
The kernel modules delivered in this erratum have been made available as part of
the Rocky Enterprise Software Foundation Driver Update Program. This program provides updated kernel modules
that add support for selected devices in advance of the next Rocky Enterprise Software Foundation Enterprise
Linux minor release. We strongly recommend that these kernel modules are only
used to enable specific hardware, mentioned in this erratum. Partners and
customers should continue using the driver that is shipped in the latest Rocky Linux
kernel for all other devices that require this driver.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library.
The kernel modules delivered in this erratum have been made available as part of
the Rocky Enterprise Software Foundation Driver Update Program. This program provides updated kernel modules
that add support for selected devices in advance of the next Rocky Enterprise Software Foundation Enterprise
Linux minor release. We strongly recommend that these kernel modules are only
used to enable specific hardware, mentioned in this erratum. Partners and
customers should continue using the driver that is shipped in the latest Rocky Linux
kernel for all other devices that require this driver.
rocky-linux-8-x86-64-baseos-rpms
kmod-redhat-oracleasm-2.0.8-15.el8.x86_64.rpm
44ac298ff3dec860dfc4aec171bcc9773a2e7ccbd205eb52988df8242d048bda
RLBA-2022:0315
glusterfs bug fix update
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glusterfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
rocky-linux-8-x86-64-baseos-rpms
glusterfs-6.0-61.3.el8.x86_64.rpm
7b4395ba08f669c0ea9647e26b8c88e845d2f2f31fdb8179f56c21da74fe747d
glusterfs-client-xlators-6.0-61.3.el8.x86_64.rpm
a85ff13669cc25ec58dfcda4a781c07ad781e68417182f9e9e7ab0edacb88793
glusterfs-fuse-6.0-61.3.el8.x86_64.rpm
706dccc4571910a954ea3d8dd10eee3a6ca07d4053269d54059d26a7cf72afc1
glusterfs-libs-6.0-61.3.el8.x86_64.rpm
1927c8a597133b446f0e3045d0afd5d190378254c3a6c723c4c467c4f0ffb93f
glusterfs-rdma-6.0-61.3.el8.x86_64.rpm
826edb740bc7ce2a2e531b04ca586d8be47ec0ec1968b8e43ca97a849e3b4746
RLBA-2022:2006
python-pip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-pip-9.0.3-22.el8.rocky.0.noarch.rpm
4dc82e21beb0c285c4a765dfe48f5df6d8ee15c38bb4d0cda37cc826a2c7e951
python3-pip-wheel-9.0.3-22.el8.rocky.0.noarch.rpm
b2beb19f4cc4a7865bcc4394b24994f53c675d14865ad39bcf2bcb3ca67a2ad1
RLBA-2022:7726
grub2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
grub2-common-2.02-142.el8.rocky.0.2.noarch.rpm
6175338b02c00922aae1c9241c84ea5c71cd59bb24bec6dd84981f9f6143f9e6
grub2-efi-aa64-modules-2.02-142.el8.rocky.0.2.noarch.rpm
3963bf6faa29aaea861bc1a256d0423698ba885faee100d9dc9b6037dc296a75
grub2-efi-ia32-2.02-142.el8.rocky.0.2.x86_64.rpm
4ffa66853d75fa0d08da238d56a41e3b031823a2aefad3d2cf5f34aa3aef184e
grub2-efi-ia32-cdboot-2.02-142.el8.rocky.0.2.x86_64.rpm
1e9d6116e83e8ff9c9c7c4d49bb4d0a79db15cc3a933dd9f25a05d310e61c6ab
grub2-efi-ia32-modules-2.02-142.el8.rocky.0.2.noarch.rpm
b986ac569ebe723ae5bab0de5a3779a30f27752791db7cedcf71be257016768c
grub2-efi-x64-2.02-142.el8.rocky.0.2.x86_64.rpm
92d1b8fb83f820c58f5aab4c1ad3fef4bf7a8e9b91176121e15dfc4902293c32
grub2-efi-x64-cdboot-2.02-142.el8.rocky.0.2.x86_64.rpm
6b3c53665f157e46cbcc0f55065dbe3bc3b0eb86c48674373252a75b8ae8696a
grub2-efi-x64-modules-2.02-142.el8.rocky.0.2.noarch.rpm
0a51865aec1df2804e25f67978bbdd93278cd4f94641afe8304e0c948373d025
grub2-pc-2.02-142.el8.rocky.0.2.x86_64.rpm
f95c3537c44601b217002f501bc263fcc38da9ecffa8d2eec3eb0ed8683a70b8
grub2-pc-modules-2.02-142.el8.rocky.0.2.noarch.rpm
c2374cad2069df6c2fbf3fe92b892c9bd04ebab2f8794cd38c2827b3b9c71ce6
grub2-tools-2.02-142.el8.rocky.0.2.x86_64.rpm
57efaa38fa859bb8a51b688816d16ae1dd22f4dcdd051389a9132abf6e15e7be
grub2-tools-efi-2.02-142.el8.rocky.0.2.x86_64.rpm
1f3c1ed1644056fba727a2e4a58521879a0ce0c319181bf804e817e6409e5409
grub2-tools-extra-2.02-142.el8.rocky.0.2.x86_64.rpm
f60e420795a561dfeff8e0187d0f439f79a1266c790699caa0bf02db728152dd
grub2-tools-minimal-2.02-142.el8.rocky.0.2.x86_64.rpm
0aa50f6861020636fedae52d4df78b779d531775a30f64cb1259dd7f17fcc836
RLBA-2022:7739
sssd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
2b0a25c49789fba2c51fd9ec52452072f2e540dd9d7e108d85926da97fe53a68
libsss_autofs-2.7.3-4.el8_7.1.x86_64.rpm
9315acfb31602e68f3108bbcf3ae1ce2284754d71999f0ccce2f030da526cfaf
libsss_certmap-2.7.3-4.el8_7.1.x86_64.rpm
ef2188a436ca5e742b9c7ff1bb048ed51970131b1b1dd15ba66a8a6ddb50ee6d
libsss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
2a5b2632a44438e860792c637b000391aa266103fce05495b7b415845565c8a0
libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
d56c119593e8255294782593a8752917121626d8f451d239a41ccd79238e01da
libsss_simpleifp-2.7.3-4.el8_7.1.x86_64.rpm
1c961919f1a87b3314da8e29abbf24be253b6209946abd4570ff308f891f6ae0
libsss_sudo-2.7.3-4.el8_7.1.x86_64.rpm
8002f4af2b3014313e0e8b0be0e367a5870d8ff2662a86d55644c1cefbf18c45
python3-libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
662f05c80a436c05eb93c64af5ec17a4cb40c5170887068289b4cac306d7b7fb
python3-libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
41b7414c44d384931919f598d0dccc3ebd3f354719f3394079255a88adc3561d
python3-sss-2.7.3-4.el8_7.1.x86_64.rpm
42f321023b133a14290644eeb23c93ecab5d51b3e59570d8b8162607b04ab085
python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm
6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c
python3-sss-murmur-2.7.3-4.el8_7.1.x86_64.rpm
01c7c36729533d921205ff7f39245aff781db0b5475fb4e672785819b9328bc2
sssd-2.7.3-4.el8_7.1.x86_64.rpm
5051d53ac5df96df4062b8004780b3134a770263c4add8e41a6361eaa7324e02
sssd-ad-2.7.3-4.el8_7.1.x86_64.rpm
d82edf19f57c16e16acb145dc7d29e65dd96d4921d7972903ae96bb5ce83f956
sssd-client-2.7.3-4.el8_7.1.x86_64.rpm
ab6de7cd139f88513de8ca2f01db4017c8428fa663cc899f7252de8348206c8d
sssd-common-2.7.3-4.el8_7.1.x86_64.rpm
079034e36153d700d1373ad5c6d5936fe07c89cca587d2c2e04401bc7ad5954a
sssd-common-pac-2.7.3-4.el8_7.1.x86_64.rpm
70d338dfcf7642581fe77829964f801ace4dcb18559f3f714f01f61b313a000f
sssd-dbus-2.7.3-4.el8_7.1.x86_64.rpm
b4ca2da01eed9e540352acec3c3e8303ed6b8f90585935bc7205cf1612e8d733
sssd-ipa-2.7.3-4.el8_7.1.x86_64.rpm
a35fb89b88eabb04e165a074adffcc6114aec1c7ae9d85841ef31be1f0c9df83
sssd-kcm-2.7.3-4.el8_7.1.x86_64.rpm
2c2087677022939f952339173ec3f8f231ee56703df47518ccbaf46fd9f3baa7
sssd-krb5-2.7.3-4.el8_7.1.x86_64.rpm
cee94b872835bab3b869702f8e33ea8021415d5f85a4fdc04dd707f84341cbfe
sssd-krb5-common-2.7.3-4.el8_7.1.x86_64.rpm
71440d5c7e8f05e82c5c7fd3ee1bcf18d62670d9512d1b427fc2f10ef02d1e68
sssd-ldap-2.7.3-4.el8_7.1.x86_64.rpm
5112e64c8840bdaa795497a68b734439e12872ec5dbf16e0f0ab905268e1f6f6
sssd-nfs-idmap-2.7.3-4.el8_7.1.x86_64.rpm
ae8eb40f7de0b69aa91ae2b3d2e5168d426cbfbbd9ca97809ffc4c02b9ddd862
sssd-polkit-rules-2.7.3-4.el8_7.1.x86_64.rpm
8ead8ea9bf4c7f89adf140b89a890ee59744b626e06e58a9b5c9a27fb1ec88e1
sssd-proxy-2.7.3-4.el8_7.1.x86_64.rpm
80bf29198a06a20202a7b2cde28f75f0057fdb5825e552e7db07a52e6ececf17
sssd-tools-2.7.3-4.el8_7.1.x86_64.rpm
ea27ca6015d9115cd01c78560d6b36db6daf4338aeaf74879d704c5a93da1bae
sssd-winbind-idmap-2.7.3-4.el8_7.1.x86_64.rpm
885103316f6ef9796189d9b294a9db757c6a52dde27ba7fecb7d249ea889453b
RLBA-2022:7766
fwupd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
fwupd-1.7.8-1.el8.rocky.0.3.x86_64.rpm
0c9d197889ff8ef892c9764b459068350e40530311d1015a3b13ccd00d56febb
RLBA-2022:7784
chrony bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chrony.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
chrony-4.2-1.el8.rocky.0.1.x86_64.rpm
729f342794c6e5edd6229221abbd6bf3315491603a5715758df9bcac9272f9c6
RLSA-2022:7790
Moderate: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bind-export-devel-9.11.36-5.el8_7.2.x86_64.rpm
9e7f239d97615ce9f2a312f081ef94b3e9ba9c9e4f987d22e298491506c0061c
bind-export-libs-9.11.36-5.el8_7.2.x86_64.rpm
35e6cd12f9d803bb60cfd7bf8a44ba73b8d0117432801d097d5851011ecd822a
RLBA-2022:7832
python3 bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.
Bug Fix(es) and Enhancement(s):
* python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.
Bug Fix(es) and Enhancement(s):
* python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436)
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-48.el8_7.rocky.0.x86_64.rpm
61e1bb3936eb62653e41f51499554d594a3891078c16238f92f0a17ff119cd53
python3-libs-3.6.8-48.el8_7.rocky.0.x86_64.rpm
f915967824e987568d9f023811caa9c4790487160a362438e9748f9bb5016531
python3-test-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e278462c08b9ad22433a1af437384c718821f2f060aeecec9123c7a3346a1a7a
RLSA-2023:0049
Moderate: grub2 security update
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
* grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
* grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
grub2-common-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
5b88d6f55060a730cf0f5b8688ae26c8eff68c853c842247a090d6e81c50a4b9
grub2-efi-aa64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
4f09a4d990d333e3265c18b4c0a5158e47d639596d85deecfd57a2abb8f5e31b
grub2-efi-ia32-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
5a1a04d6023f891035ec564e221f7d40cbb892f689b78d0d89bf1ef2432e8b52
grub2-efi-ia32-cdboot-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
9563d13dc10fb2721ffe79c5885629ab702aef3f38c9756f114d2e552c66132b
grub2-efi-ia32-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
defdae03ca69e0522d87a043586cf9d9935f951cb0e0ef419eaa2754992664e9
grub2-efi-x64-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
14512f77d67ac227ad3f707d924c50c4e15c65ee39292e01443e5c3c5bfd2dcd
grub2-efi-x64-cdboot-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
baaf19e256d5588739381e23c2907448b232b271cc8611c09f9a4244be1acd26
grub2-efi-x64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
96dbda0fb20996d949e00180be8c7abbb3d43e8ad2e6baf5ae0f80a16ef0aceb
grub2-pc-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
96a1084510860d5ab4f67d65b7cc51db2dfd9d49d706c65b49ff3844d705a562
grub2-pc-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
ded04f98279737ee20b5f99c735b31ab66168490b763fff0d3670e8af01243da
grub2-tools-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
b0829b4f8a74457265f11cacecb25673bb0a5260d3154632c7cc58d5e4aafe89
grub2-tools-efi-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
58a681f3c7846c5402f870260b0afb756ec051f7896ca0e44f4d788a06ce90c3
grub2-tools-extra-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
b4209dcdb8a57e6e3d0d76fd3f84d7fa8cc10e1c49b8927e79650b4ff15db705
grub2-tools-minimal-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
34e839cf72b78f2bef2a1a9bf867b94eb11b2b0006f21cb0181cb3c2bb15238f
RLSA-2023:0625
Important: libksba security update
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow to code executiona (CVE-2022-47629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libksba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow to code executiona (CVE-2022-47629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libksba-1.3.5-9.el8_7.x86_64.rpm
13b0d50a82d975654e0a1a83b81b33380ba77f84763885674de4bed7a4631ebd
RLBA-2023:0658
kmod-redhat-oracleasm bug fix and enhancement update
The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library.
Bug Fix(es) and Enhancement(s):
* Rebuild kmod-redhat-oracleasm against kernel version 4.18.0-425.10.1.el8_7 (BZ#2155759)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library.
Bug Fix(es) and Enhancement(s):
* Rebuild kmod-redhat-oracleasm against kernel version 4.18.0-425.10.1.el8_7 (BZ#2155759)
rocky-linux-8-x86-64-baseos-rpms
kmod-redhat-oracleasm-2.0.8-15.1.el8_7.x86_64.rpm
ea1058a1f05e8818d54a0ce3cf8b849760a242481f88b3e2c4c6f7f3e9a93891
kmod-redhat-oracleasm-kernel_4_18_0_425_10_1-2.0.8-15.1.el8_7.x86_64.rpm
76860217265725d828a4d399ba2825387472ff7bbdc04f9f3e94ac51d674626c
kmod-redhat-oracleasm-kernel_4_18_0_425_3_1-2.0.8-15.1.el8_7.x86_64.rpm
68272f11899af1eab903d3f733890ecc610f742ffc67166432c667182568ab13
RLBA-2023:0830
iptables bug fix and enhancement update
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.6 Packet drop in ebtables (BZ#2144922)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.6 Packet drop in ebtables (BZ#2144922)
rocky-linux-8-x86-64-baseos-rpms
iptables-1.8.4-23.el8_7.1.x86_64.rpm
97d31943ea173ebb9fa2b5389f246c4ea66ee007b6f997e0721a35f1b695f3a9
iptables-arptables-1.8.4-23.el8_7.1.x86_64.rpm
3f9b7a6f683a0fd775de7206283bdc38051fe5b7f85a54d87518d791dc4076df
iptables-devel-1.8.4-23.el8_7.1.x86_64.rpm
9700ec49f7c06cca19941362b3c140259d303c91b91f442f9ed8076ae7602d1d
iptables-ebtables-1.8.4-23.el8_7.1.x86_64.rpm
073d34183b084194b6871db214b730af3ae7fa1bb69a32ee85b034c76051dc5e
iptables-libs-1.8.4-23.el8_7.1.x86_64.rpm
be1946a383469ae5dc437589d216eea4f85842c9511ab9ab366b3a0b7c928d29
iptables-services-1.8.4-23.el8_7.1.x86_64.rpm
5ed063733d02daf590448d770d6ea0b6eb77cf9dffb6cd70c7e424e61a270c0c
iptables-utils-1.8.4-23.el8_7.1.x86_64.rpm
4e9871505d38d5c6d710d82ba0797a8d060e11a9e803022d38f64919afe9e901
RLBA-2023:0831
nfs-utils bug fix and enhancement update
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Bug Fix(es) and Enhancement(s):
* Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Bug Fix(es) and Enhancement(s):
* Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899)
rocky-linux-8-x86-64-baseos-rpms
libnfsidmap-2.3.3-57.el8_7.1.x86_64.rpm
da85dfd1afa352bb9695310801b0b0ebd06bc6d8689c6ad3ad2da9b7ebe2c2ae
nfs-utils-2.3.3-57.el8_7.1.x86_64.rpm
b0979c15176774f349a8730d476ed50908d1e1b3211ddfce8e9a7fa661515a68
RLSA-2023:0832
Important: kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)
* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)
* MEI support for Alder Lake-S (BZ#2141783)
* Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)
* Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)
* Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)
* Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530)
* error 524 from seccomp(2) when trying to load filter (BZ#2152138)
* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)
* Connectivity issue with vDPA driver (BZ#2152912)
* High Load average due to cfs cpu throttling (BZ#2153108)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)
* Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)
* Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)
* Azure: VM Deployment Failures Patch Request (BZ#2155280)
* Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289)
* MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)
* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)
* Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)
* The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)
* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)
* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)
* MEI support for Alder Lake-S (BZ#2141783)
* Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)
* Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)
* Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)
* Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530)
* error 524 from seccomp(2) when trying to load filter (BZ#2152138)
* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)
* Connectivity issue with vDPA driver (BZ#2152912)
* High Load average due to cfs cpu throttling (BZ#2153108)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)
* Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)
* Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)
* Azure: VM Deployment Failures Patch Request (BZ#2155280)
* Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289)
* MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)
* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)
* Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)
* The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)
* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-425.13.1.el8_7.x86_64.rpm
5a567569cedf4f7c6ea2e588487dc37c9c6f30a05b8bcca45da740c569b712ab
kernel-4.18.0-425.13.1.el8_7.x86_64.rpm
d4295895806bdc8fe95e5c95e7d9bab99bb044b9583b12d6373f50cfc7eb179c
kernel-abi-stablelists-4.18.0-425.13.1.el8_7.noarch.rpm
112fd585aeb8f69a65d5191dfb7710c00a2fa0818413eb730a52c519c9e798a6
kernel-core-4.18.0-425.13.1.el8_7.x86_64.rpm
6949643abed2c947735dffd559b972648fb2bdbc642a6bdcc7ef0f65e6b1895b
kernel-cross-headers-4.18.0-425.13.1.el8_7.x86_64.rpm
dbbd9d450eb4159387e8cdc7158a1005253732ec5850bf807c50775ebb263e1d
kernel-debug-4.18.0-425.13.1.el8_7.x86_64.rpm
bfed537ae29f64d93799ac20dc41198b707801f7f172e9cdd03179c33f712d8d
kernel-debug-core-4.18.0-425.13.1.el8_7.x86_64.rpm
b437d5e3e404ad466d8b63d0b57fdf27ed399ef995fc523585988cda3342b6d5
kernel-debug-devel-4.18.0-425.13.1.el8_7.x86_64.rpm
8e9e17c769a7577eed7207f3fa435c490b89796ce1234d9a8588dac48afb1420
kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64.rpm
61abd26b67195663011c739beb2b224534a31d23eeb6b7cbde9b2c7b0aadf016
kernel-debug-modules-4.18.0-425.13.1.el8_7.x86_64.rpm
1b85f82a3b8c641695adf265030b153e0bb6692d51b93849cee1fb5bab912755
kernel-debug-modules-extra-4.18.0-425.13.1.el8_7.x86_64.rpm
308d75e14bf95409855d9f55d2ca96c33462a6048c363e6aa5ff105ba582b6eb
kernel-devel-4.18.0-425.13.1.el8_7.x86_64.rpm
21d5e8a2600b7fafcf68f8ffe6abacac9e110f6be8420b3af7270e106060ec83
kernel-doc-4.18.0-425.13.1.el8_7.noarch.rpm
d29d0316ba11bbbfb22ebf404f6aa18c7d6f67d1cb3d705b22918ebbe1e272a6
kernel-headers-4.18.0-425.13.1.el8_7.x86_64.rpm
f72590eca43e899d3f62328eacaefc5e591a56c2a44fc9e122e16b7ff8661330
kernel-modules-4.18.0-425.13.1.el8_7.x86_64.rpm
9ddb6105eef3fc0d3dfdf76c0bf439327b7e1d6bbdd164cede97732c850329be
kernel-modules-extra-4.18.0-425.13.1.el8_7.x86_64.rpm
537b843f074cab438c0bbbd45825d54c5220dc94ab99b2c97edbc4b81dd7c737
kernel-tools-4.18.0-425.13.1.el8_7.x86_64.rpm
861fcf559d901ad8850fdbb30787c1e61811fea5493502c03b9cffbe2f1f8c7c
kernel-tools-libs-4.18.0-425.13.1.el8_7.x86_64.rpm
fc9d43339480cebd5769caada7387524658fca8a7e4662edafecf27a80510ce1
perf-4.18.0-425.13.1.el8_7.x86_64.rpm
7bb18c9edc571b4841ac5da0a8b9536fad0479bff26efd951b6e821457577400
python3-perf-4.18.0-425.13.1.el8_7.x86_64.rpm
8de4c04d6cece4fe8680c3c5e715486dc54ea723f67d9464d2a8d338aafce1b9
RLSA-2023:0833
Moderate: python3 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
4eaf62a1cfd3e2a3236e34fa66f8f1086cabeb71040021a5ff79dca95f959f91
python3-libs-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
c3d965c8baa421e4465ad92be8738482958c4ab55b285acd8db6b4d69fddfa8a
python3-test-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
15e9d64277e97b66a6c0cf0ac581d985205d9587489b8bc37a25d747b0aa3247
RLBA-2023:0834
kmod-kvdo bug fix and enhancement update
The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
Bug Fix(es) and Enhancement(s):
* Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
Bug Fix(es) and Enhancement(s):
* Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783)
rocky-linux-8-x86-64-baseos-rpms
kmod-kvdo-6.2.7.17-88.el8_7.x86_64.rpm
5a80977949d46a8e5085491d43e28ef2d20519883b0ccccc8edc61139de66854
RLSA-2023:0835
Moderate: python-setuptools security update
The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages.
Security Fix(es):
* pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages.
Security Fix(es):
* pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-setuptools-39.2.0-6.el8_7.1.noarch.rpm
79df645d4964ddd0977ff1df4c6eab07573681474107927e5c1a236a8db7682e
python3-setuptools-39.2.0-6.el8_7.1.noarch.rpm
086432d50e40817e2dc2c45c54f60802f4368f5bde2949757f65804f48c9120b
python3-setuptools-wheel-39.2.0-6.el8_7.1.noarch.rpm
a088f6171dec158f26bf60f942294f5ec8ba1f30f447f3828ff201b59a87a19e
RLBA-2023:0836
OpenSSH bug fix and enhancement update
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732)
rocky-linux-8-x86-64-baseos-rpms
openssh-8.0p1-17.el8_7.x86_64.rpm
05b6cb94628abfde46a888ff467ff895b72255e318d60b6e56cef934ccc6773c
openssh-cavs-8.0p1-17.el8_7.x86_64.rpm
5ed6a37b7db8503c7bdde856cf49904531d78878e5340e88d43528258d0ba463
openssh-clients-8.0p1-17.el8_7.x86_64.rpm
f99eb73f6f0e5bc0629e3d1a824d3706841ae98dbcff2b169e6b54b076b6db2e
openssh-keycat-8.0p1-17.el8_7.x86_64.rpm
c40243ec966f1e1bf36aa5f8d1529fbc8e6b64c70058f86c082fa45c54850079
openssh-ldap-8.0p1-17.el8_7.x86_64.rpm
594f3959565141e894a3dae7ad4a4d409e475c7bc4dc5c3ed786978c21994fc3
openssh-server-8.0p1-17.el8_7.x86_64.rpm
127c4130240a6295ec9699f0485fe4505f380fda8660bbee2e1625eca8e3e6e4
pam_ssh_agent_auth-0.10.3-7.17.el8_7.x86_64.rpm
5460a2de12107bf9e83e804bd667c9d329605f6ee44cb18bae68784bfada5972
RLSA-2023:0837
Moderate: systemd security and bug fix update
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* systemd doesn't record messages to the journal during boot (BZ#2164049)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* systemd doesn't record messages to the journal during boot (BZ#2164049)
rocky-linux-8-x86-64-baseos-rpms
systemd-239-68.el8_7.4.x86_64.rpm
4570fb885df57f65d9e3840f60253f6eb96759ab9f7a890d85c1403a42e4059c
systemd-container-239-68.el8_7.4.x86_64.rpm
d27b57e269000afc18af1b2a1d0bda777406fbfd7f257a900d0d3e77d00138f6
systemd-devel-239-68.el8_7.4.x86_64.rpm
fd4044d117e6b6af19b9a27fe5a996cbe8da367c8165cd2c1a9527f32813ab6c
systemd-journal-remote-239-68.el8_7.4.x86_64.rpm
62145940f536b2c8ed3b4a5632df5b8385c36773148893c9071a60f74bf3bfc4
systemd-libs-239-68.el8_7.4.x86_64.rpm
22e74ab19875536ea8ef5e8fb739c3dea8e3642b66cb77fa205e1398f48e8b2a
systemd-pam-239-68.el8_7.4.x86_64.rpm
356487ffaca88133d8e09a98dd2fcb9f5be0ddc74dd17c716671a3725a3e23b3
systemd-tests-239-68.el8_7.4.x86_64.rpm
2c4980c7f64f4fe56d392346f6884209b51dc94f7432c46df343ca76071eb0ed
systemd-udev-239-68.el8_7.4.x86_64.rpm
eb0fb3bbfdebe5c3de2e29ff21b817e2acaab13b979a4923236516ade3ed7bc6
RLSA-2023:0838
Important: samba security update
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
ctdb-4.16.4-4.el8_7.x86_64.rpm
3e323c101092468ae7da5a7b2a4839e4bf8ba285f3e2d0b1adb75e445da94d28
libsmbclient-4.16.4-4.el8_7.x86_64.rpm
8481d62fa3336fc9c870eeb48aaaca4bc3b59bb62a3cba80ef29c0599f03ad87
libwbclient-4.16.4-4.el8_7.x86_64.rpm
a34de817747f178da58fa3bffdbc220b4047e0ee72e61453506796a4274f96c8
python3-samba-4.16.4-4.el8_7.x86_64.rpm
7aac04965e10d8859dea3cefef5bd4da7316b9b1950809e6cbe8fd93267fce86
python3-samba-test-4.16.4-4.el8_7.x86_64.rpm
95e9014204cdcad709b4902e3032167d238e212e176fa232a7f8ae5e5d7db5ce
samba-4.16.4-4.el8_7.x86_64.rpm
d5b6a420c4230744222ae054e094738b57c6d2f18c3de5f019c7c19fe368e4bb
samba-client-4.16.4-4.el8_7.x86_64.rpm
37eb1a7e2428501ba9af75749751963cfa6418daf28cb2faabd636eec6da407b
samba-client-libs-4.16.4-4.el8_7.x86_64.rpm
c15d47a95fac4795b0ac703e0ff3a0240c2f88c5e1142fd35f7c7f0d4744b5e1
samba-common-4.16.4-4.el8_7.noarch.rpm
920a53593c8fc91fbcb9b53fda376f997eaf9ebc446e682369e57001c749c535
samba-common-libs-4.16.4-4.el8_7.x86_64.rpm
49c9ba71012de2eaece7bdda88962595553ab0c9b0599530f4452da3fe8f89bd
samba-common-tools-4.16.4-4.el8_7.x86_64.rpm
021444294bfc84f1d7173cf14dd97a30a18e136593ed48ebe4009ae8e90ee5dc
samba-krb5-printing-4.16.4-4.el8_7.x86_64.rpm
2b9900678a6c53e6f306799c818fd002c74e608f7ba5b050728f7154bfff3889
samba-libs-4.16.4-4.el8_7.x86_64.rpm
48cca028d3bc571664202481e682720917382cb888a5205b77d85b53676bd25a
samba-pidl-4.16.4-4.el8_7.noarch.rpm
b4ed5fcbf7bb9802c768852c4a23821a354feb7440f5cc28df778882400c41d4
samba-test-4.16.4-4.el8_7.x86_64.rpm
936dd3c596eb9003bcd0dde0132c4619b6f782688b4e649ba10cee26087e1858
samba-test-libs-4.16.4-4.el8_7.x86_64.rpm
c36c0b08a4b893b28daeb9f30196113eafe23be4d9942bc747e5142434248943
samba-winbind-4.16.4-4.el8_7.x86_64.rpm
18ff309fc462b70631a5564bed68044625271e95f3865ef3462d8be880218235
samba-winbind-clients-4.16.4-4.el8_7.x86_64.rpm
a4f11fa8b60046bf49bb7888f83190d44fd0e83e1655ffc387c9df693898052b
samba-winbind-krb5-locator-4.16.4-4.el8_7.x86_64.rpm
4a31984bca3d407d5dace83534452dfa9bc2513c9816929011a355eabdeeb531
samba-winbind-modules-4.16.4-4.el8_7.x86_64.rpm
d735e5573c44d8fe4963eb6d97ec17ef083a3c4cad9cb991ed0de6e38a0d92d3
samba-winexe-4.16.4-4.el8_7.x86_64.rpm
cbbe1ae079685316ab452cd62f9c3b17ae3e64c20d8d914a5829c8bceaf56113
RLBA-2023:0840
curl bug fix and enhancement update
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Bug Fix(es) and Enhancement(s):
* curl fails large file downloads for some http2 server (BZ#2167825)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Bug Fix(es) and Enhancement(s):
* curl fails large file downloads for some http2 server (BZ#2167825)
rocky-linux-8-x86-64-baseos-rpms
curl-7.61.1-25.el8_7.2.x86_64.rpm
b7bfb42bf7e2ad81c14a5942f31cf59d1fd4eb32f20b7448e9872dc7543e45bb
libcurl-7.61.1-25.el8_7.2.x86_64.rpm
65c3664a0bda934c2c04cc258896c4d7c0493245eae19fd311942142e5c61f7a
libcurl-devel-7.61.1-25.el8_7.2.x86_64.rpm
3231b00cd2b2bc5dc0c3467355c26f971e512a8610c34fa288bc64df1b6a05b7
libcurl-minimal-7.61.1-25.el8_7.2.x86_64.rpm
9ce59b8aa7261966e7ee3ec1c4097dd6fee2eab0fac635d1dd6a4151545fcce1
RLBA-2023:0841
grub2 bug fix and enhancement update
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es) and Enhancement(s):
* HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es) and Enhancement(s):
* HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411)
rocky-linux-8-x86-64-baseos-rpms
grub2-common-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
d9144ef96e60849f7499704dccc1769bf2e202b10c020e8e60e990a94073c7a5
grub2-efi-aa64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
c35195531f6ad155e0bbb19a5cbdb30ea89aa1088eb0aec40af8cc31c4753f4b
grub2-efi-ia32-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
e95fc32333e2b638bde9bb5a36759cac44d9921c2db9ea3cd6362998ced2d8fb
grub2-efi-ia32-cdboot-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
d69659825041b8b7b50bbceb0c3f676279c66414857fe7a048342e71b9bc4d36
grub2-efi-ia32-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
0a31dfc5494ba26886bb20882418e884a2f4fc51ecf2cc3bbf33c51e86b05571
grub2-efi-x64-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
cb7cf6e87fc670dcaaef3cd38f1775c573f711ca22b319ca5cc6583fe2f5ba0a
grub2-efi-x64-cdboot-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
9d0c14ffce7ff4348e1bb9206318d4611643458b45b72adaeb8e76c9835402b3
grub2-efi-x64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
53b84245064eb9a42bae0cc85e1fa43b7871085446b813bcf71dfd0c734acb29
grub2-pc-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
a9ecba58f77bc8b2fce92074e73e4ba8be1631c105c6d2f1f1e7c86ee43b1f70
grub2-pc-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
8d96bea14500c3f01fc24e2c37ae18dfa8f92c27c0b0721ff923d568b6ed8400
grub2-tools-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
fd20cd0d63526cce1f68aa695939040bc9b0cec43291d49eb5c5f6f3ef97f4fa
grub2-tools-efi-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
d1cfaaf2baf92e6a090d6fc77e9c043050844e3167653e2b82c367e57ee7122c
grub2-tools-extra-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
6a0296766622f44cc914c9457a9150b4aaf54445f36eb04998bba5d0f0bb3a24
grub2-tools-minimal-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
3ce72ed30d0b5260da067abf546246ea7a73525f0b0798a873aab7c5dd0e6071
RLSA-2023:0842
Moderate: tar security update
The GNU tar program can save multiple files in an archive and restore files from an archive.
Security Fix(es):
* tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for tar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU tar program can save multiple files in an archive and restore files from an archive.
Security Fix(es):
* tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
tar-1.30-6.el8_7.1.x86_64.rpm
7957bc9ed49b36674b462b2d20b0d1522070cb789d767d420a2672fcec79e798
RLSA-2023:1140
Moderate: curl security update
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP multi-header compression denial of service (CVE-2023-23916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP multi-header compression denial of service (CVE-2023-23916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
curl-7.61.1-25.el8_7.3.x86_64.rpm
e94b29f4ccaa93bf67f376cb08e065688d42f1f65d1561df1563fb9bff92c077
libcurl-7.61.1-25.el8_7.3.x86_64.rpm
3bf6e412d40b46ac4b2f757fc5b1b25375a6dba10e6e75df84565cc03a0d4ab3
libcurl-devel-7.61.1-25.el8_7.3.x86_64.rpm
3c3b544ddbbd6b700ee7cecdd2970aa2ea5dc8f61cc1faad75931e5d9c288dec
libcurl-minimal-7.61.1-25.el8_7.3.x86_64.rpm
5fcf3360382094bf6267481626e021acf15b8c89a2f8a71f11a09dbbdb4aac63
RLBA-2023:1300
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655)
rocky-linux-8-x86-64-baseos-rpms
sos-4.5.0-1.el8.noarch.rpm
09cecb873d49432c060f6a8e741833a7cbe0ddae4d2cee238694b9c3dd7eaed4
sos-audit-4.5.0-1.el8.noarch.rpm
d11f01fb828ef8de3e04bcc64f976a61fe0955eec21da53e379a03263f9254bf
RLSA-2023:1405
Important: openssl security update
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
openssl-1.1.1k-9.el8_7.x86_64.rpm
9a938d81016ef3c3e733e4769e188999fbbfcdec71318a4698e1040d28867770
openssl-devel-1.1.1k-9.el8_7.x86_64.rpm
7b1d407a69745004f56fa33cd2d345f1a84f9e8710ded5e0265dacbd4cc4e150
openssl-libs-1.1.1k-9.el8_7.x86_64.rpm
1773916c99960d474e56f6ee2e7f2b94a3fa536a5fe12e4445bea0e34ea6ba01
openssl-perl-1.1.1k-9.el8_7.x86_64.rpm
aac00ecf8f661033d59a38fa9944b36780c0e5bc64fb7f00c1ae2a249b8840ab
RLBA-2023:1565
device-mapper-multipath bug fix update
The device-mapper-multipath packages provide tools that use the device-mapper
multipath kernel module to manage multipath devices.
Bug Fix(es):
*Multipath segfault after running newest patched version (BZ#2161393)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper
multipath kernel module to manage multipath devices.
Bug Fix(es):
*Multipath segfault after running newest patched version (BZ#2161393)
rocky-linux-8-x86-64-baseos-rpms
device-mapper-multipath-0.8.4-28.el8_7.3.x86_64.rpm
64703fc5ab66132cbecd8fee01cb99e47478e03e59d6734a03f7ff03d0597164
device-mapper-multipath-libs-0.8.4-28.el8_7.3.x86_64.rpm
815c4941b909fb5eaba3b8969dadfb11754ad19831b040aef95c5e200545fd48
kpartx-0.8.4-28.el8_7.3.x86_64.rpm
aaa18469140d1383e3f2eafbcdaa0e4961a58e0a347626e12556df1ab96f5a9f
libdmmp-0.8.4-28.el8_7.3.x86_64.rpm
982d0163a217206f174f5614881430114ccbdfd8dbd6538a0edc493241632c27
RLSA-2023:1566
Important: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770)
* Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170)
* AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275)
* Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750)
* Kernel panic observed during VxFS module unload (BZ#2162763)
* Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587)
* Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296)
* kvm-unit-test reports unhandled exception on AMD (BZ#2166362)
* Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368)
* Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640)
* Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645)
* mlx5: lag and sriov fixes (BZ#2167647)
* Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896)
* Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228)
* fast_isolate_freepages scans out of target zone (BZ#2170576)
* Backport Request for locking/rwsem commits (BZ#2170939)
* ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550)
* Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103)
Enhancement(s):
* Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770)
* Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170)
* AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275)
* Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750)
* Kernel panic observed during VxFS module unload (BZ#2162763)
* Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587)
* Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296)
* kvm-unit-test reports unhandled exception on AMD (BZ#2166362)
* Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368)
* Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640)
* Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645)
* mlx5: lag and sriov fixes (BZ#2167647)
* Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896)
* Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228)
* fast_isolate_freepages scans out of target zone (BZ#2170576)
* Backport Request for locking/rwsem commits (BZ#2170939)
* ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550)
* Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103)
Enhancement(s):
* Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384)
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-425.19.2.el8_7.x86_64.rpm
e7c94ef18c138d559ca2f22e646a903384b385dec32d59f254cc7d26ffbdadf5
kernel-4.18.0-425.19.2.el8_7.x86_64.rpm
c729ed610919c93f864208abaa01415b4c97921850ccbb6b4ef71f0a5c65ba28
kernel-abi-stablelists-4.18.0-425.19.2.el8_7.noarch.rpm
42e95052460987534f500f7d2475155e2253339a854c66081b660da0e93a2963
kernel-core-4.18.0-425.19.2.el8_7.x86_64.rpm
b8f62457ce99fde135ee6def380c4087ee6abde840cadb9536e978e6560e6884
kernel-cross-headers-4.18.0-425.19.2.el8_7.x86_64.rpm
436a50f7193328f9628475eaaf3535dd1b490666236146a1dbe988e734b62501
kernel-debug-4.18.0-425.19.2.el8_7.x86_64.rpm
4857ba6f6b3e89da3f42d9cc3e8dd97f4439ea3533d06c21d45d631ff6f02291
kernel-debug-core-4.18.0-425.19.2.el8_7.x86_64.rpm
83617a3330cbd93a214fc74ba4b656cdf4916540a71e8c54fcac3a755b29008f
kernel-debug-devel-4.18.0-425.19.2.el8_7.x86_64.rpm
ddb9c75682453f0dac4bd37540dcb37b9fa367ea2f7889dcff18dee2ca22838a
kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64.rpm
ab5fbe04e87180e71b07fdd51cbc0b71763f0b67d26e799064b59de5f24bd51a
kernel-debug-modules-4.18.0-425.19.2.el8_7.x86_64.rpm
efba853ecfd14e7c271c0353ff9eb84ba7ab9f882d6775b7f48c7c88cb8f4706
kernel-debug-modules-extra-4.18.0-425.19.2.el8_7.x86_64.rpm
f82fda6617bda86ac0494f7e743a56c6163a4806eb8a25dfcb88663a1a1cca1a
kernel-devel-4.18.0-425.19.2.el8_7.x86_64.rpm
050e1c1323bf319aa4617b94675464ad77a07e3f54cc7b8550adc30242e24009
kernel-doc-4.18.0-425.19.2.el8_7.noarch.rpm
c72d6e283b89b4330922b34ba4cf3dbda58d9e847fd00d75d963d139ea2c53c9
kernel-headers-4.18.0-425.19.2.el8_7.x86_64.rpm
d0eb4977e942db3d6a07f1e0797ec243af1a7e2fd72fc10308f0fe1a13f227b5
kernel-modules-4.18.0-425.19.2.el8_7.x86_64.rpm
42db8452c0ce91d2bdb279e1015405a109d2171373fad1a2de04ad6871df86cd
kernel-modules-extra-4.18.0-425.19.2.el8_7.x86_64.rpm
15c24631eaf525ae241b2bbf0d1183e0a737cb4b715e8c6902a291d661fc0ffe
kernel-tools-4.18.0-425.19.2.el8_7.x86_64.rpm
a6fef183dbd6a420193cb8dc890990fa0aab12a5d0b198f8afb55db0b4c9d4f2
kernel-tools-libs-4.18.0-425.19.2.el8_7.x86_64.rpm
3df2788f8b1f651eedb5491ff8cd1ef2402cef90c822d0317f6dbebdc9bacdcc
perf-4.18.0-425.19.2.el8_7.x86_64.rpm
f54d6c1e1310c6cc5ba83f34f53307939bf500a1621cdc04ce3b7b84efdd36c8
python3-perf-4.18.0-425.19.2.el8_7.x86_64.rpm
e0324a5dbce6e51ce6939c628f2c21858e6c39fdd3fbc4693062ccad3ceea47b
RLBA-2023:1567
samba bug fix and enhancement update
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es) and Enhancement(s):
* Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394)
* ctdb should have dependency for package samba-winbind-clients (BZ#2170467)
* Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468)
* samba-tool reports an uncaught exception (BZ#2170469)
* Ship new samba subpackages (BZ#2173975)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es) and Enhancement(s):
* Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394)
* ctdb should have dependency for package samba-winbind-clients (BZ#2170467)
* Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468)
* samba-tool reports an uncaught exception (BZ#2170469)
* Ship new samba subpackages (BZ#2173975)
rocky-linux-8-x86-64-baseos-rpms
ctdb-4.16.4-6.el8_7.x86_64.rpm
54f2020578129c0ca43e3d985e5f3c8ac0ab65dfa1d89767de4b46c5981dbdca
libsmbclient-4.16.4-6.el8_7.x86_64.rpm
8c6745dc30e7a7801106f434a6fd1143e71384bf66b6cb9a9b9b967c4d53f67e
libwbclient-4.16.4-6.el8_7.x86_64.rpm
d08718f1efe3bb47cd8cf79f886d43bef3acb1ee0663a12c75fdaf1344241b8b
python3-samba-4.16.4-6.el8_7.x86_64.rpm
720204669b1b1344cd65c448adac9b214195990f664b98b85b6a1fe1aafd06b8
python3-samba-test-4.16.4-6.el8_7.x86_64.rpm
1f36b8adc3e669b48061b0f7a822c82ab0dc7f1c3631b76eb5fa8a2627426d6e
samba-4.16.4-6.el8_7.x86_64.rpm
1a4b0e2ba34cbf6c5eb92bfa0a35c5e8a8e9fdbb1ed4bad33a10c4b650655c71
samba-client-4.16.4-6.el8_7.x86_64.rpm
64ed2e3c5fd7e0397d7261707fef9250f86b4664e088c5316ff318f674946ff9
samba-client-libs-4.16.4-6.el8_7.x86_64.rpm
f4d61ef915fd2a98c42989fe8c179af770a5476706d615391df5a47fdcb41029
samba-common-4.16.4-6.el8_7.noarch.rpm
97d51a6b773106001a616d443beb10dc4f2720de02c2cdebe92cc6fb33289395
samba-common-libs-4.16.4-6.el8_7.x86_64.rpm
668543d5621f4f993b0e6375025e643b1d722e96e8b55d83be6e4238ffa436bc
samba-common-tools-4.16.4-6.el8_7.x86_64.rpm
5f3e679a20ef595027602860be82819b5bc8e58d02b6fd18773113de900cf42c
samba-dcerpc-4.16.4-6.el8_7.x86_64.rpm
88edcf0b0f6651cdc68b6a44cb98302a5bb87a4154fb27f7bc7335d2260d3d54
samba-dc-libs-4.16.4-6.el8_7.x86_64.rpm
ff10faaf34f2f9964121596baee51482ed51822207d146329b64b0d0cb1621d0
samba-krb5-printing-4.16.4-6.el8_7.x86_64.rpm
bd02588ef1bb9c8af4a84463287ee027b12e0316d73d3760e9215452fe06ad6e
samba-libs-4.16.4-6.el8_7.x86_64.rpm
6363a01eb86d79b822b41ae4f25daef4e941fc20aa9555b89abd2dd565972ee6
samba-pidl-4.16.4-6.el8_7.noarch.rpm
934707d614ffd5c2222c70f953a539bc8b92ffc4b75414a8ad034e53d82ea84e
samba-test-4.16.4-6.el8_7.x86_64.rpm
cc33da8640765be111af1d8cd12d473b834c51505ab94f9d9e3c0f10d64c9a9f
samba-test-libs-4.16.4-6.el8_7.x86_64.rpm
d809aba8393fc812674446ce75e6c332bfe27fab66234d2e3e1587dc5d6d3e46
samba-winbind-4.16.4-6.el8_7.x86_64.rpm
1275eb113fd8a64b465b20965447009c911faa38fa1ea5d93e6a7d5ae141dafa
samba-winbind-clients-4.16.4-6.el8_7.x86_64.rpm
1967de4b51f9579817bb82ec702fa6888fd8b6f7895b67a77fad8bc2fe7262d5
samba-winbind-krb5-locator-4.16.4-6.el8_7.x86_64.rpm
20c145f5cb4a59941b3537f858dc8a3ecb771d4ab6c4a912527496aae1615a91
samba-winbind-modules-4.16.4-6.el8_7.x86_64.rpm
273edf803ccaadf53b7e4c422f0d5cdbee3f1fa29200e3a2605359f3f697d050
samba-winexe-4.16.4-6.el8_7.x86_64.rpm
b84b22b41da3615d30d04f00c4a56306ee3fc82b45fa962171121ba59671903e
RLBA-2023:1568
selinux-policy bug fix and enhancement update
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510)
rocky-linux-8-x86-64-baseos-rpms
selinux-policy-3.14.3-108.el8_7.2.noarch.rpm
2013aed46a43d0a5dc40c88703d4d87f417fac5e30b5fc4a0aa22f971e85839c
selinux-policy-devel-3.14.3-108.el8_7.2.noarch.rpm
862b21fb9d39d528ba3c4706401063f5cd769ddd246aeb2784f0bc204833d5cb
selinux-policy-doc-3.14.3-108.el8_7.2.noarch.rpm
c7960959abe31333dbdfc42cf004e54bec43c5b82816d0efe13f3c5dc65c3e16
selinux-policy-minimum-3.14.3-108.el8_7.2.noarch.rpm
59ba05d47369d385080c7601f5a0f110ed043454bc2f8a2442b90f1450e5dccc
selinux-policy-mls-3.14.3-108.el8_7.2.noarch.rpm
9644f8b01fa6ff683ab447ce29d6433db26f6516bb67e147a87bc50d603876f4
selinux-policy-sandbox-3.14.3-108.el8_7.2.noarch.rpm
800716bd8afd4b143ad5d2da713ce0c9c27b5775f7ee840ea6e1f27e6264f8f7
selinux-policy-targeted-3.14.3-108.el8_7.2.noarch.rpm
edca9f783ee64438467aab41236f4d68bf0cc390c4b6975cdaad10d04b5d5591
RLSA-2023:1569
Moderate: gnutls security and bug fix update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152)
rocky-linux-8-x86-64-baseos-rpms
gnutls-3.6.16-6.el8_7.x86_64.rpm
5e4ed69fec2da582fb01f7d4ab5f6024ade26cba9af6ddc1b65c8702850520a1
RLBA-2023:1570
NetworkManager bug fix and enhancement update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager hostname lookup fails with IPv6 (BZ#2174362)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager hostname lookup fails with IPv6 (BZ#2174362)
rocky-linux-8-x86-64-baseos-rpms
NetworkManager-1.40.0-6.el8_7.x86_64.rpm
82c3c779d3241fbc7bef8dd6d670a4484eb93939a084365e922971dad6169d8b
NetworkManager-adsl-1.40.0-6.el8_7.x86_64.rpm
5b46ac90f769aad6603f50210a7b57e89ca802e8e8bc28852a375fdcafcc02f9
NetworkManager-bluetooth-1.40.0-6.el8_7.x86_64.rpm
727184d6fc4555e0babe5b42b2142073dd729147a0d51ba16755ec6cf73652cb
NetworkManager-config-connectivity-redhat-1.40.0-6.el8_7.noarch.rpm
6cbb3a4599412d4f9532c78c37a25a7fc1d13c3db025c56ca81b018ceb4474b8
NetworkManager-config-server-1.40.0-6.el8_7.noarch.rpm
c19ab8732408c8519100a185a29a88f6552b6c13f88179999a3478c61a98fa0a
NetworkManager-dispatcher-routing-rules-1.40.0-6.el8_7.noarch.rpm
f5b804bb2124b9760066f570061afcedb5c51ac16c6fb7d78c8d987a4472d69a
NetworkManager-initscripts-updown-1.40.0-6.el8_7.noarch.rpm
bd3bb61ec99c1b671a3cd14b349cf56bd38d4951dc63bdc5d5c33b964df64731
NetworkManager-libnm-1.40.0-6.el8_7.x86_64.rpm
d0766561c8a07b70b6d8516810a9d7221db09688669bc7743167a202552e5d2b
NetworkManager-ovs-1.40.0-6.el8_7.x86_64.rpm
bc85b3d875caf318530dcdcdcedaff8f417fe087f2907d3f11ea40ca5c81c3c8
NetworkManager-ppp-1.40.0-6.el8_7.x86_64.rpm
3f0e9224417156c113778f5ec8b98922607ff115a6585c17ca1e9bc082bfbd54
NetworkManager-team-1.40.0-6.el8_7.x86_64.rpm
43d0a26d8f8e7ce97d49fdb52265d82dbeeee6034295f7cacc1227b0d81a8f2b
NetworkManager-tui-1.40.0-6.el8_7.x86_64.rpm
a13cd9f9a90a3b38859a1bb35fa0778bc8b1b777a0e20fd899a9223cedea8474
NetworkManager-wifi-1.40.0-6.el8_7.x86_64.rpm
8d0d510f9ed82c8af25cc939a9c1c26dfe36fb52657ebae7f983dbf05518ae1e
NetworkManager-wwan-1.40.0-6.el8_7.x86_64.rpm
8210252ef33a531c119dacfafe833fe2d1a3398f24a87548618d87fa0a51a8a4
RLBA-2023:1571
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* [rebase] rebase sos to 4.5.1 (BZ#2175806)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* [rebase] rebase sos to 4.5.1 (BZ#2175806)
rocky-linux-8-x86-64-baseos-rpms
sos-4.5.1-3.el8.noarch.rpm
6b7406d995defe6c7158fd2342a79920920c06c94b0ed3670423892afb782297
sos-audit-4.5.1-3.el8.noarch.rpm
43723ff3f321f3847b20a5162268aace1d60dbb7812534ae808add2d3ba93133
RLSA-2023:1930
Important: emacs security update
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: command injection vulnerability in org-mode (CVE-2023-28617)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: command injection vulnerability in org-mode (CVE-2023-28617)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
emacs-filesystem-26.1-7.el8_7.1.noarch.rpm
e818eac7fc25269dec708905b869d866a00355e16ca5524cacb291d1f6d383f0
RLBA-2023:3103
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2023c, which addresses recent
time zone changes. Notably:
* The changes added for Lebanon in tzdata-2023b have been reversed. This update
reinstates the DST change for Lebanon effective March 25.
* This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2023c, which addresses recent
time zone changes. Notably:
* The changes added for Lebanon in tzdata-2023b have been reversed. This update
reinstates the DST change for Lebanon effective March 25.
* This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a.
rocky-linux-8-x86-64-baseos-rpms
tzdata-2023c-1.el8.noarch.rpm
172d38efe4e48e867246cfc57b33d60043c4b31cd7787e9a2b2567e89753c9d0
RLBA-2023:2953
kexec-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kexec-tools-2.0.25-5.el8.x86_64.rpm
ff0d34cb1d06749935cbfa3d3adb39f96d177015202c1c0da6a280e60febd51b
RLBA-2023:2956
libteam bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libteam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libteam-1.31-4.el8.x86_64.rpm
64f333907f546ff886323153cdc0dd959ce6ebb985f1cd920030be950ae9e54c
libteam-doc-1.31-4.el8.x86_64.rpm
3aa1092f416fe39a097978cf89dee19b3704048179ae90bcb7fb2c673a74f821
network-scripts-team-1.31-4.el8.x86_64.rpm
885998bd1c974ce43667925df1d18e7f13a71213d9606ba660810eb8529f83f2
teamd-1.31-4.el8.x86_64.rpm
33fcc14545bd22703123fc1cfd88aa133b40f4d28a7bacc73a7cfa409d8a8220
RLBA-2023:2957
kmod-kvdo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kmod-kvdo-6.2.8.7-88.el8.x86_64.rpm
197c3c5ef31137418aaf63d5ce71b265c4e75285ca0a635f81a52cadace977ae
RLBA-2023:2966
tboot bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tboot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tboot-1.10.5-2.el8.x86_64.rpm
eea21199d9c98020c453d12f3f386919fb953106940bed8498dba3dccb46599d
RLBA-2023:2978
opencryptoki bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
opencryptoki-3.19.0-2.el8.x86_64.rpm
c65d3f6ad175cc50e19966e6e5b2fa24eea85156fbafd565c80bed8d6e63e564
opencryptoki-icsftok-3.19.0-2.el8.x86_64.rpm
817c1e72eb9dc3e33fc2ecb085e4feaa888473bb6f3fb8db9c0c3620d532dbdf
opencryptoki-libs-3.19.0-2.el8.x86_64.rpm
b8d4dbc6ac59f32f9b8f1f56c1a40409aa5aeb1270102caf8528fa3c2084e6a8
opencryptoki-swtok-3.19.0-2.el8.x86_64.rpm
d01970d3b73208993142d4560cbcf0a23cbfd150736f191685700366f1682c41
opencryptoki-tpmtok-3.19.0-2.el8.x86_64.rpm
4109780b43ec7dd122305563b21835e0764e249e8a46234a45ed806f1e5665c5
RLBA-2023:2979
libdnf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libdnf-0.63.0-14.el8_8.x86_64.rpm
fb0348039a81e4052b2e688472f60060e1a932f7b155e811d2bd0641606f79c4
python3-hawkey-0.63.0-14.el8_8.x86_64.rpm
eb382fddc65c6f263ee4237d6daaa8848ef6ef054d64b85ad3f95a0a212a6680
python3-libdnf-0.63.0-14.el8_8.x86_64.rpm
b4a834bd1e7a60d46f4d0fcc86af98e6c4d6465db9755b8cd1c6bd5473fa4d40
RLBA-2023:2984
subscription-manager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-plugin-subscription-manager-1.28.36-2.el8.x86_64.rpm
5a4e1612c5401c9ef0820c807c695075ba8237946b6a62d6e9027ed7b723c5a4
python3-cloud-what-1.28.36-2.el8.x86_64.rpm
bf355bc70c3bfaabea69624c326d0ae83668988ef48a952e9043c6cbe5bc6b3d
python3-subscription-manager-rhsm-1.28.36-2.el8.x86_64.rpm
984161b00205948430c3605ac03b1d350c0734e0636b1ba0f9eb0ec2a0661978
python3-syspurpose-1.28.36-2.el8.x86_64.rpm
9cfa1c641e310f35225653f570dcffcfad7b1f1eb735ffaf711f92cf7164f00d
rhsm-icons-1.28.36-2.el8.noarch.rpm
cd7db5da1b82708148a5720eed115437564328817ef9c61cb33c4c140f70da1f
subscription-manager-1.28.36-2.el8.x86_64.rpm
69d337f9765c73e4e5609fe8f8aaa4d037c8a483b6da474784cfc2b560ae57a8
subscription-manager-cockpit-1.28.36-2.el8.noarch.rpm
d82b6f2e75b756e034caacd882e52fc8378568e89b82a82a60c11ef9ed8af904
subscription-manager-plugin-ostree-1.28.36-2.el8.x86_64.rpm
19ad9b4556224d165aada066b719f222a6a0653651323f969f3b7902d2126fd7
subscription-manager-rhsm-certificates-1.28.36-2.el8.x86_64.rpm
51e7a83b5774db248a1c53afcd66bb17f9a4873ebdbeccc0169a966b52cd3951
RLBA-2023:2991
libtalloc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtalloc-2.3.4-1.el8.x86_64.rpm
5a76e05740878a475b22069e56e0cd5658273f415a8dcf22137ab97c1ef5e471
libtalloc-devel-2.3.4-1.el8.x86_64.rpm
b489ed308b647b8272adf23bfd268178da065768c979677910a7bbc2b3d9b9be
python3-talloc-2.3.4-1.el8.x86_64.rpm
d4974b83af1da8f7b4511271242b170bfda42e7d58b08cc7f8d15114341f11bb
RLBA-2023:2996
cryptsetup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cryptsetup-2.3.7-5.el8.x86_64.rpm
48ff177cf87a4bc384963f3db9f9308ae97c2113ab36b15ffa07918135daba48
cryptsetup-libs-2.3.7-5.el8.x86_64.rpm
727a71268220f90692b99060b244d15a32906eb71c02c0b7121e10e51a03088a
cryptsetup-reencrypt-2.3.7-5.el8.x86_64.rpm
78f6928db7a58643dfff852bd5c1fd8d596193b4f535e3b6b3c1af42f0d3374d
integritysetup-2.3.7-5.el8.x86_64.rpm
87288f867b5afb9608693460ff26886a957e9f0e12f8a5567fe81ae3606a0e58
veritysetup-2.3.7-5.el8.x86_64.rpm
a0dc83c3b451a0e84951abaff1a2d681bb01153b6ea69e66478ec67b8ec6a56b
RLBA-2023:2997
adcli bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
adcli-0.9.2-1.el8.x86_64.rpm
8fa9afb4c9365b4695f4a112fd15e842549fcd79dc60af517dcc948a8faa0ad1
adcli-doc-0.9.2-1.el8.noarch.rpm
15217133c085f89b79dc4b20a9e14b0e0b0f0f1884f3aef111327d47fa8df53e
RLBA-2023:3007
libtraceevent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtraceevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtraceevent-1.5.3-1.el8.x86_64.rpm
1e70b0b15e9be88354705f0462b8422a020978bacc3e36d72e2f02aafcb76d65
RLBA-2023:3010
libtracefs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtracefs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtracefs-1.3.1-2.el8.x86_64.rpm
eda6968b4b591db0a3aedc9555073cc1c1b4fa496fbe92ab465c604e73a4166a
RLBA-2023:3016
tar bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tar-1.30-9.el8.x86_64.rpm
55e2cb6a1e29746ae59fcd1138bcbfcd372362e5cae0c3483ce643711a7a7707
RLBA-2023:3036
librhsm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librhsm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
librhsm-0.0.3-5.el8.x86_64.rpm
b3eaa310cf4d75e640dc31ebd7083777f9d17cc162bb8763f6032a3691855eb8
RLBA-2023:3043
perl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-Errno-1.28-422.el8.x86_64.rpm
46bf5e2b26133ae96a22feaf62d5993f3a7054f03090cd8348ba4bd4eab8380c
perl-interpreter-5.26.3-422.el8.x86_64.rpm
65d93d0fb4f022a6882da3632b83a6eae700d54a236d819669b1b998f6adb6dc
perl-IO-1.38-422.el8.x86_64.rpm
baf711875b0dbabd8eb852cd28928c452d220f3976bd61853c3a77e8d66ff62d
perl-IO-Zlib-1.10-422.el8.noarch.rpm
0d3e1c768da883fe6c7f9c2b889eb0f6b2d0618d3897dac5e9db54cac1b396c0
perl-libs-5.26.3-422.el8.x86_64.rpm
724c620ac247ade5056b4d0d22b1617140bac8cac9fcfdfefdd6a70791191b0d
perl-macros-5.26.3-422.el8.x86_64.rpm
2d9267fa70dbfd0c7104d4897cd35c07d4fd33bd224dcace515209dc2e49fa52
perl-Math-Complex-1.59-422.el8.noarch.rpm
39ea34de65b999e9d930e330d681f41de8e33867cc8b21f81ecd8c3a2983c40a
RLBA-2023:3048
lvm2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
device-mapper-1.02.181-9.el8.x86_64.rpm
11e5cd7404833170c8573d516ea0171bea9f18151939c2d2705e1126bea1208c
device-mapper-event-1.02.181-9.el8.x86_64.rpm
e2b5eba79c16bfa99fa725c014ab7b5a2855fed8330306a0fb3e30e334cfff6f
device-mapper-event-libs-1.02.181-9.el8.x86_64.rpm
ef19aa1980349b3dff9ec3ec441d6410622219093d3a24fd49d882433bf995f5
device-mapper-libs-1.02.181-9.el8.x86_64.rpm
868ade12b74be5a492450f1a8f0b1438a4de5663045eee9c9e122dd5df0a3c92
lvm2-2.03.14-9.el8.x86_64.rpm
8af03a650690a6ba53887e1945d87ebe5b63dafa3893396410b2807a48051ebc
lvm2-dbusd-2.03.14-9.el8.noarch.rpm
9009cba46706d0f596478343943c8c4d13896b61ccb641a836658735f8d51277
lvm2-libs-2.03.14-9.el8.x86_64.rpm
dc7216c4f307233236ad5cfcf7f6e99854d8b894814eeaeaf0e5d8474ab93982
lvm2-lockd-2.03.14-9.el8.x86_64.rpm
cdc638e5ea27106ce1e3dc1a123387ffc64f43fda95fb64c2cf24ffdb3becc3d
RLBA-2023:3060
opa-ff bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opa-ff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
opa-address-resolution-10.11.1.3.1-1.el8.x86_64.rpm
05f3293d8e913e1d65d92617b1a98b3baec19dc72db4d247bb12b23e04d86aec
opa-basic-tools-10.11.1.3.1-1.el8.x86_64.rpm
2b65d40d5a27432c8cbb67e05827b1580b6cf4fde4fd5457ff6c0cdc6a59f9db
opa-fastfabric-10.11.1.3.1-1.el8.x86_64.rpm
72f4c536e7e8d602a8a135380060fab1aae1f7c8a7d58e2b99ef39b00a557ef0
opa-libopamgt-10.11.1.3.1-1.el8.x86_64.rpm
dd726541bdfe6083f81f44420a09ce75833765e7d76a9a770f88e990c9d183ed
RLBA-2023:3063
file bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
file-5.33-24.el8.x86_64.rpm
07e9e94435e1226ff099a260124525a6f36daaf6d8f33c8cc5803b83755f3c5e
file-libs-5.33-24.el8.x86_64.rpm
1ca5c1c361c443e560e29c436e1ccf3d8a0adb870102156b5d538d18fadc24b2
python3-magic-5.33-24.el8.noarch.rpm
e1561599f12135b7b36a64fe32ccea7c919aaf5ec469b42f42a6acfee796673d
RLBA-2023:3064
python-dmidecode bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-dmidecode-3.12.3-2.el8.x86_64.rpm
dc57ae4b97be2dac9b4c4e1fb87ffe3470d3591ead288f883ea34e994db9d0a8
RLBA-2023:3066
mcelog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mcelog-189-0.el8.x86_64.rpm
6896e93cc63ef2a0326cc753bea02b962298cfedf11f8d1d769eb897d2312edb
RLBA-2023:3102
util-linux bug fix and enhancement update
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Backport hint about systemd daemon-reload. (BZ#2180442)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Backport hint about systemd daemon-reload. (BZ#2180442)
rocky-linux-8-x86-64-baseos-rpms
libblkid-2.32.1-42.el8_8.x86_64.rpm
6466a92b77ef0cec7ccb122de0d172bd4d2993df5d6dfcd1b917b97d2cf5b03c
libblkid-devel-2.32.1-42.el8_8.x86_64.rpm
6ff60e7036e6c18b03df263fc32475122bfdd90c8b539cdee024d14089505839
libfdisk-2.32.1-42.el8_8.x86_64.rpm
85d52e13ec46bf12854732d25ff172a490426ba7775d4ede89b1961ac3ab08aa
libfdisk-devel-2.32.1-42.el8_8.x86_64.rpm
5c54d72aac0b7ffec31827af808e40db7e33e1c81c1d8923c6ad15ae379d09fb
libmount-2.32.1-42.el8_8.x86_64.rpm
a342297a82824e38c8c99738fac77a6c1f6606620998c7758689680497c246c7
libsmartcols-2.32.1-42.el8_8.x86_64.rpm
01c742e55f7e8dc55dc6b6841912046327dd742025d9ee055b0c829435b9e5c8
libsmartcols-devel-2.32.1-42.el8_8.x86_64.rpm
98874102c383c79d0bff5ea0c5050e9b3e2fd1d6199d9161de50094b543a6822
libuuid-2.32.1-42.el8_8.x86_64.rpm
9b9783cd011bc75e083378897f906a6d1310afa2487ebd22f05c1a5ce4cdd99d
libuuid-devel-2.32.1-42.el8_8.x86_64.rpm
bf5f3184a6875ec0c666fea2f30bb04d8c8ac595abc6800232a97c40123fd085
util-linux-2.32.1-42.el8_8.x86_64.rpm
846287e4f0b071cdf1d7ea79300ed5a129e2046b1ed78ce9d0c3331e8838b166
util-linux-user-2.32.1-42.el8_8.x86_64.rpm
6be8ddfa7592c194399ac6767aa53babd790f65ac1c1b9f583040c8a6196883a
uuidd-2.32.1-42.el8_8.x86_64.rpm
59ec3ad02024f82775f0d74966afef43ac551989375389b9f2ae6808272f5b4b
RLSA-2023:3106
Moderate: curl security and bug fix update
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: FTP too eager connection reuse (CVE-2023-27535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: FTP too eager connection reuse (CVE-2023-27535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029)
rocky-linux-8-x86-64-baseos-rpms
curl-7.61.1-30.el8_8.2.x86_64.rpm
acc48a589455977d27eed5c9bdfc121d79e281566bb8b830fcd04055e801fdc6
libcurl-7.61.1-30.el8_8.2.x86_64.rpm
60631ad8be454c5cdc9951a25ffc23c4ddbb7abfadb1743e42bebc4f1a2746c3
libcurl-devel-7.61.1-30.el8_8.2.x86_64.rpm
ebd163d53585a97281389ea65fe1adb6f03c1f9d86b7c55bb4466483191826c9
libcurl-minimal-7.61.1-30.el8_8.2.x86_64.rpm
479730498fefe7003900ae47f44ade768b97ab46c0acfaefc3349db7022aa1ca
RLBA-2023:3414
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684)
* [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254)
* [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602)
* [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272)
* sos subscription_manager plugin may collect proxy passwords (BZ#2177282)
* [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062)
* sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859)
* [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176)
* Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684)
* [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254)
* [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602)
* [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272)
* sos subscription_manager plugin may collect proxy passwords (BZ#2177282)
* [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062)
* sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859)
* [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176)
* Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984)
rocky-linux-8-x86-64-baseos-rpms
sos-4.5.3-1.el8.noarch.rpm
7f0a8ece1f9aef2b5284bb694100b677b74d6fa26017d106cc1d6d5e66be5b3f
sos-audit-4.5.3-1.el8.noarch.rpm
775fe1c26d95e93cb646eb46b0f9b89b9322f55e1be3e39a360e9d816165248f
RLSA-2023:3584
Important: c-ares security update
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
c-ares-1.13.0-6.el8_8.2.x86_64.rpm
234a646e09c0d5ed88fcc961ecd0c16d8629310e4dd8faf726ba2ab8e9a696cf
c-ares-devel-1.13.0-6.el8_8.2.x86_64.rpm
664c60afd63cb17dce9fb651a024afb7bf0696a0e7e36d3983f87e2ac4205586
RLSA-2023:3591
Important: python3 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm
7cef4e886c0a8034c2063b1e1ed8b1302164ae22b23b3d7a2c7ef50cea8904a4
python3-libs-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm
5ed2aa94bda97267c4aab0244dbdc08116625d29ff262dd171f850801fb77b43
python3-test-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm
6a357f80622a93af11df32fdb2a21bfb9e978705cebe6ad29a74820922f1faec
RLEA-2023:3843
microcode_ctl bug fix and enhancement update
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, and CVE-2022-38090. (BZ#2171233, BZ#2171258)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, and CVE-2022-38090. (BZ#2171233, BZ#2171258)
rocky-linux-8-x86-64-baseos-rpms
microcode_ctl-20220809-2.20230214.1.el8_8.x86_64.rpm
b7321f00c2334aa8d946906ba153fe1335c5db02e813ae5e034ecc588d25be22
RLBA-2023:3845
NetworkManager bug fix update
NetworkManager is a system network service that manages network devices and
connections, attempting to keep active network connectivity when available. Its
capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and
PPPoE devices, as well as providing VPN integration with a variety of different
VPN services.
Bug Fix(es):
* NetworkManager brings down connection when the IPv6 link-local address is
removed (BZ#2209355)
* ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and
connections, attempting to keep active network connectivity when available. Its
capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and
PPPoE devices, as well as providing VPN integration with a variety of different
VPN services.
Bug Fix(es):
* NetworkManager brings down connection when the IPv6 link-local address is
removed (BZ#2209355)
* ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975)
rocky-linux-8-x86-64-baseos-rpms
NetworkManager-1.40.16-3.el8_8.x86_64.rpm
3c3387a026b5cefa5f308c00c3d4c10228123feceb3d1764d34f599e489dc8e1
NetworkManager-adsl-1.40.16-3.el8_8.x86_64.rpm
cd3c4a6b4203f3799c4af50991051f7f04a05b5f934454c63a27a666bb7b26aa
NetworkManager-bluetooth-1.40.16-3.el8_8.x86_64.rpm
13f1c87db578364f28fa3df071bb7e4320ad3a39b5649cbf7a0d81fa6551e7cd
NetworkManager-config-connectivity-redhat-1.40.16-3.el8_8.noarch.rpm
f555a68b7f7a51585c2e2292d108862b31b85209d3668c0e9c1678007cb79e34
NetworkManager-config-server-1.40.16-3.el8_8.noarch.rpm
eb4c373898ee5ffaffb55512fa494558d19a0dcfd937431cdb402178a6bf9fd8
NetworkManager-dispatcher-routing-rules-1.40.16-3.el8_8.noarch.rpm
157c9fa8363f772c6097d63fa65cc10ed18314dd5f2315835acc256916fece26
NetworkManager-initscripts-updown-1.40.16-3.el8_8.noarch.rpm
7e6e14dc80f29ab22894c3f854fedd4973546c1713d98c6897b25b7d728f50fa
NetworkManager-libnm-1.40.16-3.el8_8.x86_64.rpm
93180594fc3bb3b9feabcf0868e3280913e6d892beab0da515697025441508d1
NetworkManager-ovs-1.40.16-3.el8_8.x86_64.rpm
aaf8acaf3476f548cfe9c19a34849a5f03eda60915d728a1d7665e876e63626c
NetworkManager-ppp-1.40.16-3.el8_8.x86_64.rpm
0f59747a4bbf59173431620ccb858f731a0449e6b73017048ad609d3d01b632d
NetworkManager-team-1.40.16-3.el8_8.x86_64.rpm
42eb2e62e209453022acf5a29a7f1a4af074b15218882718e9abfe2f10e64f81
NetworkManager-tui-1.40.16-3.el8_8.x86_64.rpm
3f2681ab79e4911cace0b71ddc5b37dd2c08dcb1b22cca7298c9a0935dcc01f2
NetworkManager-wifi-1.40.16-3.el8_8.x86_64.rpm
f4efaca57de9b22d34a82dcf802576aa4977345693fa63c8476ec2cef97e95af
NetworkManager-wwan-1.40.16-3.el8_8.x86_64.rpm
93f9f541352232ff80455168876a2c1f8df4024d50c449bb74b888ddd4686a80
RLBA-2023:3846
selinux-policy bug fix update
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es):
* systemd-pstore fails to start due to avc denial (BZ#2188268)
* Relabeling of /run/fsck (BZ#2212328)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es):
* systemd-pstore fails to start due to avc denial (BZ#2188268)
* Relabeling of /run/fsck (BZ#2212328)
rocky-linux-8-x86-64-baseos-rpms
selinux-policy-3.14.3-117.el8_8.2.noarch.rpm
7f6ad0f813879d1a51baaef4745c48cd432c147db3b72dcee814cb671635f3a3
selinux-policy-devel-3.14.3-117.el8_8.2.noarch.rpm
dd9e5f89926683ec01278f6f61f08ceadfd5041833c4220e1c7b265619515e20
selinux-policy-doc-3.14.3-117.el8_8.2.noarch.rpm
26d11647b989995b16ece5dedc1b58881c25019c88b1b48e895dc0f9c4d84451
selinux-policy-minimum-3.14.3-117.el8_8.2.noarch.rpm
42709415e373b719dd05d16041fd82b5dc5e90c9d8243e742b4bfeef9f76685a
selinux-policy-mls-3.14.3-117.el8_8.2.noarch.rpm
6762f3e25f7f9474012da46063831e81b81fcf1c0d9cc6e36b0845c7f79b3032
selinux-policy-sandbox-3.14.3-117.el8_8.2.noarch.rpm
cc9920876bf370315c6b7646f5c547d6b2bf53a4bb3242550bd30b02199fe540
selinux-policy-targeted-3.14.3-117.el8_8.2.noarch.rpm
609cffecdf4eb34c9f6fbf929c027afa97b9af645d911a1c60335c1a412bcf70
RLSA-2023:3839
Moderate: libssh security update
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667)
* libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667)
* libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libssh-0.9.6-10.el8_8.x86_64.rpm
32e82d5635e5334428b3aecec431cffc9bbca157e076d50b7fe74a4f62b0ae30
libssh-config-0.9.6-10.el8_8.noarch.rpm
3e5d27decdf556d137d933343df069c27646eddc24424daf0a955d734d0a9087
RLSA-2023:4102
Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bind-export-devel-9.11.36-8.el8_8.1.x86_64.rpm
6dad0c90d1cf3714e0db79138ca352e04f4c14035680e20f2b7f4481ca83f727
bind-export-libs-9.11.36-8.el8_8.1.x86_64.rpm
407b106e5ceada938404e6aa0ef039de0e7b3eba1462d760b552270fada49a21
RLBA-2023:4279
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* sos report collects data from container instead of host due to symlinks  Triaged (BZ#2075720)
* sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562)
* RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951)
* Exception raised by hpssm plugin in plug.setup(). (BZ#2216608)
* rebase sos to 4.5.5 in rhel8.8 and 9.2Â (BZ#2217943)
* sos clean - Respect permissions of sanitised files (BZ#2218279)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* sos report collects data from container instead of host due to symlinks  Triaged (BZ#2075720)
* sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562)
* RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951)
* Exception raised by hpssm plugin in plug.setup(). (BZ#2216608)
* rebase sos to 4.5.5 in rhel8.8 and 9.2Â (BZ#2217943)
* sos clean - Respect permissions of sanitised files (BZ#2218279)
rocky-linux-8-x86-64-baseos-rpms
sos-4.5.5-2.el8.noarch.rpm
5cd5a9aef2b3a62a5e1a27c419b5113af2b62c3f8323aa8875eedad8343727a0
sos-audit-4.5.5-2.el8.noarch.rpm
d0f18c4d5e5b388aac649b277d7313885af6bbdc61b5ae7d62c3c56d2f487e98
RLSA-2023:4419
Important: openssh security update
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
openssh-8.0p1-19.el8_8.x86_64.rpm
2c58374f216094e48f1bbdc133da6aa319be6b7167716a73c31c3da4bc9be8e0
openssh-cavs-8.0p1-19.el8_8.x86_64.rpm
b5aa8acc3e3ce9e4daffb80915c2952fd4e18e4ce216c1f2be7a161afd2d0845
openssh-clients-8.0p1-19.el8_8.x86_64.rpm
90251af532a5d669ade3fcbf7ff056f973d875eadcb72f09dd5872992f0217ba
openssh-keycat-8.0p1-19.el8_8.x86_64.rpm
5c41c4fbecacedf7f6de31200ec18377dcabd3d2cb46155a97b3ed556e4fad52
openssh-ldap-8.0p1-19.el8_8.x86_64.rpm
f70ca5500dd837422161084a4079e7b7a56a5f9f388b5d978b2e07a7b3b02139
openssh-server-8.0p1-19.el8_8.x86_64.rpm
1bc8eedaa97f533b2d1d111880ef0ad0b5f781690221f139e7307f3f3bc1ea0b
pam_ssh_agent_auth-0.10.3-7.19.el8_8.x86_64.rpm
8f8317833a6587acd89d4eb33a02787a7d3761edcd875845e2dc9771937fd3f7
RLSA-2023:4498
Moderate: dbus security update
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
dbus-1.12.8-24.el8_8.1.x86_64.rpm
38407d4952fe8ad950c9bbae15503e654cd70db8541ad363a4863d32a520aafb
dbus-common-1.12.8-24.el8_8.1.noarch.rpm
51ab0fbbd3337ca006d0b4febe7f4b916195538845c87a8bbf1dddd9f9962f9c
dbus-daemon-1.12.8-24.el8_8.1.x86_64.rpm
6b34fb72c2040d12c830919b778b55632d6dd89920fb679840bb8b97cfedc9e3
dbus-libs-1.12.8-24.el8_8.1.x86_64.rpm
8922139e41914d3e70f3d16ca1014ea5c0c0da1e8e56f8a86cc2e539578f46cc
dbus-tools-1.12.8-24.el8_8.1.x86_64.rpm
6fc0218d86028b406b33a80335167b034369fb21d97127e8a747435e77b282f7
RLSA-2023:4524
Moderate: libcap security update
Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities.
Security Fix(es):
* libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603)
* libcap: Memory Leak on pthread_create() Error (CVE-2023-2602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities.
Security Fix(es):
* libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603)
* libcap: Memory Leak on pthread_create() Error (CVE-2023-2602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libcap-2.48-5.el8_8.x86_64.rpm
03346a85df04d758f3ac53715fc17ff5c1c448f8c9261b25b6de50c4c1d40a90
libcap-devel-2.48-5.el8_8.x86_64.rpm
0fa9ad15ae590cbb87a701154206a6c033f68595f79ffb9b6ce10162d199f1f9
RLSA-2023:4520
Moderate: python-requests security update
The python-requests package contains a library designed to make HTTP requests easy for developers.
Security Fix(es):
* python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-requests package contains a library designed to make HTTP requests easy for developers.
Security Fix(es):
* python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-requests-2.20.0-3.el8_8.noarch.rpm
b9245956faa62d6e4dd443679dd3aefd437c2510a3558a4a8772e50c6b5abeb0
RLSA-2023:4706
Important: subscription-manager security update
The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform.
Security Fix(es):
* subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform.
Security Fix(es):
* subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-plugin-subscription-manager-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
5ce9406a1a2a01c737fc3c758a62afb9907d5ddff6586bd761457ffd3007902d
python3-cloud-what-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
368136a4320e82eed9faf7523627fde7d50169876d4b22d24f27cb7950f41a9d
python3-subscription-manager-rhsm-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
35d4c9375dcd2c5019ea89b60b6e19fd97e074f607e44687182f80b5ea8cce7b
python3-syspurpose-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
7c2168df6cc6c20a530f181e57ec820e64871e065afd6ff52bb5c77e1b7dc11d
rhsm-icons-1.28.36-3.el8_8.rocky.0.1.noarch.rpm
7424b2d3e9d10f0a1c2c18bfe80b60f635d4dc924a8ac942a67f0574e041692f
subscription-manager-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
7df41f6733196406fdffe000de2f286d74254b0c9282a9ef6bcf3807f04856d9
subscription-manager-cockpit-1.28.36-3.el8_8.rocky.0.1.noarch.rpm
6c04f3fc34a4cc4a8ad23a5ec1f19f496cd4974266d4540e1e17d520f77457e2
subscription-manager-plugin-ostree-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
c91841fc3658813f9e60923051d75dc125f42606b8ef4750541e5da37d388d41
subscription-manager-rhsm-certificates-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
2fc6611d6fef46747eb6550403477c9bbdb842e45b7a922fc2b1caabf032e4a9
RLSA-2023:3837
Moderate: systemd security and bug fix update
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: privilege escalation via the less pager (CVE-2023-26604)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: privilege escalation via the less pager (CVE-2023-26604)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153)
rocky-linux-8-x86-64-baseos-rpms
systemd-239-74.el8_8.2.x86_64.rpm
f5c0c0bb29c22dd20464c1a0a82281b8a527049451c622dea7bfd5178385ab44
systemd-container-239-74.el8_8.2.x86_64.rpm
ce9ae4c06744939d95a82cfd9aa11e3f06b34b395077ab8f33db586abf60f9d4
systemd-devel-239-74.el8_8.2.x86_64.rpm
9d9df9dba19c3b54d01cfa3e8af2f85b085c4adbdbb10cff86e1a309b10aef3a
systemd-journal-remote-239-74.el8_8.2.x86_64.rpm
11988db91850a7327f3594c9015803fd5d43dbf9e589a14159126aeb49a772de
systemd-libs-239-74.el8_8.2.x86_64.rpm
a2404adcb2093e95175347d6dba5adb9dc3f238d59b05bc2446808c3a81d2990
systemd-pam-239-74.el8_8.2.x86_64.rpm
b9de5be50e984974c931af5e5573acb9362ed6cc03eb9ef54d18217728fb0281
systemd-tests-239-74.el8_8.2.x86_64.rpm
4274fbfefcc4a02924abdd8563d7f8a89e143f41d3e3a069d785765c6894a9d1
systemd-udev-239-74.el8_8.2.x86_64.rpm
1d178c05c674ef26b989acb60351e17209cd6268f9b971889900ee2d14419c7f
RLSA-2023:3840
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Crash due to misuse of window functions. (CVE-2020-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Crash due to misuse of window functions. (CVE-2020-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
sqlite-3.26.0-18.el8_8.x86_64.rpm
4d18fd348ad2f74837b4a374944be867bfcec5032712a1f6e19bc452c011b5c5
sqlite-devel-3.26.0-18.el8_8.x86_64.rpm
65f8be498216141278088dc39b92bdc6bb6d2aaff11c213e56fb3689ff7a62ec
sqlite-doc-3.26.0-18.el8_8.noarch.rpm
37bf72b866e31176a58ad1187061e3ce2ade2a2829677ca7d15a2ee3f5b7d4de
sqlite-libs-3.26.0-18.el8_8.x86_64.rpm
c7e863ac7809aca4a4333168ce561a35f1fd0af67814a30b1f34e5bed2cd786b
RLBA-2023:3841
kexec-tools bug fix update
The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec
feature either on a normal or a panic reboot. The kexec fastboot mechanism
allows booting a Linux kernel from the context of an already running kernel.
Bug Fix(es):
* [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's
firmware dump tool when 5-level paging is enabled (BZ#2189377)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec
feature either on a normal or a panic reboot. The kexec fastboot mechanism
allows booting a Linux kernel from the context of an already running kernel.
Bug Fix(es):
* [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's
firmware dump tool when 5-level paging is enabled (BZ#2189377)
rocky-linux-8-x86-64-baseos-rpms
kexec-tools-2.0.25-5.el8_8.1.x86_64.rpm
a9143d1ec54df01b7403a0868f283447b519694c789616d92cafc2274494c718
RLBA-2023:3844
xfsprogs bug fix update
The xfsprogs packages contain a set of utilities to administer the XFS file
system, including the mkfs.xfs utility to construct an XFS file system.
Bug Fix(es):
* xfsprogs: ignore autofs mount table entries (BZ#2208391)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xfsprogs packages contain a set of utilities to administer the XFS file
system, including the mkfs.xfs utility to construct an XFS file system.
Bug Fix(es):
* xfsprogs: ignore autofs mount table entries (BZ#2208391)
rocky-linux-8-x86-64-baseos-rpms
xfsprogs-5.0.0-11.el8_8.x86_64.rpm
c7b665830ac3b6dda773a184d3e50a6ff7ef653ec7e8e0374e4aa7b62197401f
xfsprogs-devel-5.0.0-11.el8_8.x86_64.rpm
fa8169513174f354ea5363aabf835bd081a591b11aab7f6b9d931887c609f89c
RLSA-2023:3847
Moderate: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332)
* iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092)
* HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305)
* kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623)
* Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595)
* block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236)
* xfs: deadlock in xfs_btree_split_worker (BZ#2196390)
* Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665)
* Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214)
* mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564)
* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284)
Enhancement(s):
* Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332)
* iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092)
* HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305)
* kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623)
* Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595)
* block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236)
* xfs: deadlock in xfs_btree_split_worker (BZ#2196390)
* Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665)
* Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214)
* mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564)
* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284)
Enhancement(s):
* Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604)
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-477.15.1.el8_8.x86_64.rpm
31f0bab3bc56411a29d2c29406f77d56bbe45da5aab525cc37e392b54b18661d
kernel-4.18.0-477.15.1.el8_8.x86_64.rpm
f65cbf162d9da3705e0c1fc153a9f9ce9b2f18eb16e8df810addf0caf7d084ed
kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm
4b57da1f93ac79480252481b3447f34b1ff62e9d62d2a0c2d11b691fdd871ed1
kernel-core-4.18.0-477.15.1.el8_8.x86_64.rpm
4bd3872fa3e92f0c061e42c0555e33c42fe058625cde325a4c6920e31af33f3b
kernel-cross-headers-4.18.0-477.15.1.el8_8.x86_64.rpm
7f7a03e72e88a2080da54f26014a387cd0fba7066342a32c892fb96a43267817
kernel-debug-4.18.0-477.15.1.el8_8.x86_64.rpm
b6f107e61eab93ced3b569e83da69a5b661e380849d7467c5792ae9b653557f8
kernel-debug-core-4.18.0-477.15.1.el8_8.x86_64.rpm
2d1ed30002c7a7375e409c3f0c2a5d1ea705e53c9247d2cd0a3c091738030567
kernel-debug-devel-4.18.0-477.15.1.el8_8.x86_64.rpm
d14f0db6c35d5390266bccd7b85d4aac8669718962f1446c43c4421a8282fcf0
kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64.rpm
bcfd7f5177e05136b91eb411f922e7ce7233774647561ce138aa7abcc4f07586
kernel-debug-modules-4.18.0-477.15.1.el8_8.x86_64.rpm
857dac18b8fb83df9a79a4e2df40747a4794c59f5cac48fce4dcbe206147fe77
kernel-debug-modules-extra-4.18.0-477.15.1.el8_8.x86_64.rpm
ad39cfb35b841bf8e99cc09348632b6446cba9bafc32b19557c178539b81601d
kernel-devel-4.18.0-477.15.1.el8_8.x86_64.rpm
93ac0fcd613a08cfa60944ce68b29446d72ed221b1963fde10a1804a35d83921
kernel-doc-4.18.0-477.15.1.el8_8.noarch.rpm
043697866fe6d669b7208572774446c3534f6783578414487bf872ee7ecb10bd
kernel-headers-4.18.0-477.15.1.el8_8.x86_64.rpm
1d11184442c5e39e462eefd22528ff73e9a35f5f7b7dd6c768147c3b9f19f216
kernel-modules-4.18.0-477.15.1.el8_8.x86_64.rpm
9ec60a5e0b22b35ef6630aec0e9dcaee0ff0dcb5ff9c67758e48bf37c54e6631
kernel-modules-extra-4.18.0-477.15.1.el8_8.x86_64.rpm
0418bd721377d0cc73956ee0a35ded8912b08ce2f0618f064840ff3debf5d8b5
kernel-tools-4.18.0-477.15.1.el8_8.x86_64.rpm
381be8353d2f9cf60bae9c45ba94d8fa78bc87557286c645177cd5e072e4b965
kernel-tools-libs-4.18.0-477.15.1.el8_8.x86_64.rpm
8acd0b35d1101bb1c65e7b3b2a1ac0ba28629d1f1bd83720e948421b11c1522a
perf-4.18.0-477.15.1.el8_8.x86_64.rpm
9529f411f361c081e264b0b58f01488e8390dc77e9dba18eddd710ef056240cb
python3-perf-4.18.0-477.15.1.el8_8.x86_64.rpm
38928b9b3fa33b1ea0add71a9dd05d25c8398653df5a9cbd7784c9d8bf5e4f52
RLBA-2023:3848
autofs bug fix update
The autofs utility controls the operation of the automount daemon. The daemon
automatically mounts file systems when in use and unmounts them when they are
not busy.
Bug Fix(es):
* autofs fails to start with combination of +auto.master and local direct map
lookups after upgrading to 5.1.4-93.el8 (BZ#2212588)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The autofs utility controls the operation of the automount daemon. The daemon
automatically mounts file systems when in use and unmounts them when they are
not busy.
Bug Fix(es):
* autofs fails to start with combination of +auto.master and local direct map
lookups after upgrading to 5.1.4-93.el8 (BZ#2212588)
rocky-linux-8-x86-64-baseos-rpms
autofs-5.1.4-102.el8_8.2.x86_64.rpm
a2b81c1c0ede5325f5bd6846335659938493b8a6c71ff5799d664ffbabdc2456
RLEA-2023:3849
iproute bug fix update
The iproute packages contain networking utilities, such as ip and rtmon,
designed to use the advanced networking capabilities of the Linux kernel.
Bug Fix(es):
* macvlan: Add bclim parameter (BZ#2209687)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iproute packages contain networking utilities, such as ip and rtmon,
designed to use the advanced networking capabilities of the Linux kernel.
Bug Fix(es):
* macvlan: Add bclim parameter (BZ#2209687)
rocky-linux-8-x86-64-baseos-rpms
iproute-5.18.0-1.1.el8_8.x86_64.rpm
9f857d270bc15d9081991e4b2b05aa90536212d1e722a4412fe84ca393697c76
iproute-tc-5.18.0-1.1.el8_8.x86_64.rpm
8708f0a4803cd55b0bf5545d3011bcca84b841006fc02774d2adb0231eeec5c8
RLEA-2023:3850
krb5 bug fix update
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Bug Fix(es):
* CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Bug Fix(es):
* CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390)
rocky-linux-8-x86-64-baseos-rpms
krb5-devel-1.18.2-25.el8_8.x86_64.rpm
b593c9ff18319e6bfa529dab8cacd18adf570af83a7b9d1b84f30bed7f201b37
krb5-libs-1.18.2-25.el8_8.x86_64.rpm
da59dccea54a76ec61593956a17270d6167157e13853571475b78ecc55b797dd
krb5-pkinit-1.18.2-25.el8_8.x86_64.rpm
47b1726fd7869fe2ef0f8c68d796411484edb306137884d2a59bc8556fbe9516
krb5-server-1.18.2-25.el8_8.x86_64.rpm
677c6f39dae4dfc0feca4d46326ecdc1104f782f1f8330dfbb9fcd8bf4f1cbf6
krb5-server-ldap-1.18.2-25.el8_8.x86_64.rpm
00ebd45b1a2223546ba8b3af006a80e1e4f8ac4bb7eae925d3add5446c78c202
krb5-workstation-1.18.2-25.el8_8.x86_64.rpm
e2ab12b140fb394d6e89895e4d86404bff9955ad884a1c4731597c458f3a7a4c
libkadm5-1.18.2-25.el8_8.x86_64.rpm
04038f0aec588ba6ea7b0f458699aa8bac736d31ebd6978342421a1d50c579c7
RLSA-2023:4864
Important: cups security update
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
cups-libs-2.2.6-51.el8_8.1.x86_64.rpm
5543d528c6c9a2b3593455fa400bb95e88980a71e271460f157d4612a0dac927
RLBA-2023:4880
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563)
* Add ovn-ic related changes for OCP 4.14. (BZ#2226682)
* [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563)
* Add ovn-ic related changes for OCP 4.14. (BZ#2226682)
* [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724)
rocky-linux-8-x86-64-baseos-rpms
sos-4.5.6-1.el8.noarch.rpm
f47f98ca59d2b49077d1894cd6e92df557dbfc2edcd8d3f66dddfc8652e7f0f7
sos-audit-4.5.6-1.el8.noarch.rpm
56078dba10109b53639db2f7da13d8fdb2ef539f9b609f1ee496b714ffeb2987
RLEA-2023:4995
microcode_ctl bug fix and enhancement update
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2229733)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2229733)
rocky-linux-8-x86-64-baseos-rpms
microcode_ctl-20220809-2.20230808.2.el8_8.x86_64.rpm
654d83a81df8bb19c4272895188b860a23551bb0fbc5f5828d672ffab68ddbaf
RLBA-2023:5354
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Adding Huawei UltraPath commands to sos package (BZ#2187407)
* sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906)
* sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873)
* Discovery plugin no longer captures data. (BZ#2222134)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Adding Huawei UltraPath commands to sos package (BZ#2187407)
* sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906)
* sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873)
* Discovery plugin no longer captures data. (BZ#2222134)
rocky-linux-8-x86-64-baseos-rpms
sos-4.6.0-2.el8.noarch.rpm
9217d56c722350a4c2fcf26c9ddeec2a08b2bef49c2c5263bc7c0970508bae9f
sos-audit-4.6.0-2.el8.noarch.rpm
67423124c974cf93feee2d9371a89ecfd17ca923daecb0889b9d6b297dfc4c4c
RLSA-2023:5455
Important: glibc security update
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911)
* glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527)
* glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806)
* glibc: potential use-after-free in gaih_inet() (CVE-2023-4813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911)
* glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527)
* glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806)
* glibc: potential use-after-free in gaih_inet() (CVE-2023-4813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
glibc-2.28-225.el8_8.6.x86_64.rpm
a96bcc58d06d8d334a76c319f13838fef91076fa67f6604a14b4efa262e053ad
glibc-all-langpacks-2.28-225.el8_8.6.x86_64.rpm
f336846f49001b0f0edfd220019bde0e0b311eed177fd9d2d9991b1372101604
glibc-common-2.28-225.el8_8.6.x86_64.rpm
eb85418d717b3bbab49967a29ea6db2b92295825343e37cb27e0b41cf4f95177
glibc-devel-2.28-225.el8_8.6.x86_64.rpm
85257bd86b8947ac1f81844580dce18f6edea550815c1b60a0345dfe72621eb2
glibc-doc-2.28-225.el8_8.6.noarch.rpm
0d2c33d3ad73b6049df6396e1691aa379ded166ada58801e971528be28ab0529
glibc-gconv-extra-2.28-225.el8_8.6.x86_64.rpm
909561e9ef8aa5934ba851f703343f0800a8baedd58d6422fb9103062c1d314e
glibc-headers-2.28-225.el8_8.6.x86_64.rpm
6c7eb8e719d9ddddea4ecdfbdb8998f07fa49bf7312e23327c427abc6fa6829a
glibc-langpack-aa-2.28-225.el8_8.6.x86_64.rpm
a8193c0429573de931e2eb36b14498905920bd3dc463b7d46a1abefa62e787a3
glibc-langpack-af-2.28-225.el8_8.6.x86_64.rpm
fce7bda507e02c956533783846da125fc6a917760f0f59822de34be01800f84d
glibc-langpack-agr-2.28-225.el8_8.6.x86_64.rpm
574462a933893023670b5fd6630ebd42d7117700953b13f06d8bbee892b3c86f
glibc-langpack-ak-2.28-225.el8_8.6.x86_64.rpm
78b9f2cbfb413130a25a4e11068c70a11d444b8c8791f3a6139c8f639aa648b1
glibc-langpack-am-2.28-225.el8_8.6.x86_64.rpm
380d974ee68f5a663d24b5d42eeb613972e8d702d49cb2c82d86605f59b75096
glibc-langpack-an-2.28-225.el8_8.6.x86_64.rpm
27e0f3fc5cb57c10a71fed6143645ddc7bd061bc766e4350968d63cce5441a43
glibc-langpack-anp-2.28-225.el8_8.6.x86_64.rpm
68d4083ebfde5dcf11c689961535ab0d46abe7614df7d324bc0720cbae6071bb
glibc-langpack-ar-2.28-225.el8_8.6.x86_64.rpm
6bc5d8024b5c85347d7a4893d4d2ea5afcf2e3b471abdae21d1b97e406ac5fc0
glibc-langpack-as-2.28-225.el8_8.6.x86_64.rpm
c051144e5e66792899cc3aa1de2e2b857b3eddabfe01480019381fed7576c983
glibc-langpack-ast-2.28-225.el8_8.6.x86_64.rpm
85e903dbfc791a5e5f028b8861ca4dfe342ab76cd93ec15c946ad5179b71d597
glibc-langpack-ayc-2.28-225.el8_8.6.x86_64.rpm
dc98a4aa741cba5a6424c59bc6142560dd6da68480847f2bbc2bb75c90e4dee0
glibc-langpack-az-2.28-225.el8_8.6.x86_64.rpm
c4f1d791937898719fc53bd18f1642a915f929c810ebb7b1e1a7ca546c382246
glibc-langpack-be-2.28-225.el8_8.6.x86_64.rpm
44999b5c6fdcd67d9c09e7bb62cfceddd72d673fbbd92916aefdd3e80c42ec2e
glibc-langpack-bem-2.28-225.el8_8.6.x86_64.rpm
48f369f261149b15082c92a410ebae968473c83670c3f9a8a5f1b61e4a4ed0c4
glibc-langpack-ber-2.28-225.el8_8.6.x86_64.rpm
842c37f6a452cad775f80cd3d3e1a6c4b6963197a63e48336c1688c5c9dd664b
glibc-langpack-bg-2.28-225.el8_8.6.x86_64.rpm
c76cced954390504099b13e6c7e482b3841974a2b50d8f10f065f92d0aba1296
glibc-langpack-bhb-2.28-225.el8_8.6.x86_64.rpm
06e76903e067a2c53951b72235daa3b3d01066e5c45e7bea58190248ef030c94
glibc-langpack-bho-2.28-225.el8_8.6.x86_64.rpm
b35ad53943f31d3ee9d3f8d3a4d75e1b3dfa657873adfe2da94e17a6a52f6884
glibc-langpack-bi-2.28-225.el8_8.6.x86_64.rpm
925c94822a5b2cfa80d317a74f1abd2d11c7ad110428a3b2e979001ff406bede
glibc-langpack-bn-2.28-225.el8_8.6.x86_64.rpm
d292406fd5403de1446b55fded0bca33000e221775ec8fa1433a9ca2302e547d
glibc-langpack-bo-2.28-225.el8_8.6.x86_64.rpm
2c6fd690439f449ae5e51e7960ebd2e8f4fdba4e38144325d0c3fe62b8696d7b
glibc-langpack-br-2.28-225.el8_8.6.x86_64.rpm
088353552915adc50b7088e79e0d378c1018877da925fe17477afefdaed2f95b
glibc-langpack-brx-2.28-225.el8_8.6.x86_64.rpm
4653be2f7c81111e117144f42d8e3731cc8836ba5d31f2c2201e35d2781c5215
glibc-langpack-bs-2.28-225.el8_8.6.x86_64.rpm
494af6fe4f6ef1b13daf51f3f4f94878cd7adb6749636ca375b485e0f6a7efb9
glibc-langpack-byn-2.28-225.el8_8.6.x86_64.rpm
5f8c7d1a062e8dc61ecd24cd4f8ca020e134570f055e587dca95f605e9aca205
glibc-langpack-ca-2.28-225.el8_8.6.x86_64.rpm
6183b8a8c9f0bd4e89490cfc46b48a12f0a804271ccc00e06a763b5224cc26b3
glibc-langpack-ce-2.28-225.el8_8.6.x86_64.rpm
b54c5cb9adebfe3ce351c9954f16d5e46f3ab7d033f662c707409c02195a718c
glibc-langpack-chr-2.28-225.el8_8.6.x86_64.rpm
e301b500c0b5a31d92a8fa39101f3232b2736c206887b0f9ae45e02c314be423
glibc-langpack-cmn-2.28-225.el8_8.6.x86_64.rpm
40c8b072ac800b25f7fa00f2304ae7b55ffb89fea625f9f180d6ad837c8dab57
glibc-langpack-crh-2.28-225.el8_8.6.x86_64.rpm
3659180fd6d16ddb241f891694942f1350dd02a170d1545dfa4a9ff3f8d28b9d
glibc-langpack-cs-2.28-225.el8_8.6.x86_64.rpm
c3910be8ce5505c68e063f4f9271d38f707081d8ae13f6b13e7ede0acef657e7
glibc-langpack-csb-2.28-225.el8_8.6.x86_64.rpm
dda0b66d04173a89e18ead0ec97cb442168ff0ffc34c624f9331d16d685ecf9b
glibc-langpack-cv-2.28-225.el8_8.6.x86_64.rpm
15762f58b3f8577311cdfc43fdf07c3b7121367d7d414b501d3d9d27695b79e9
glibc-langpack-cy-2.28-225.el8_8.6.x86_64.rpm
7a2e6928d67c8a4d9b5ac03379efbe824910de0b0dd3c1dc8c1de2162477fd51
glibc-langpack-da-2.28-225.el8_8.6.x86_64.rpm
47104d79af0b336a813c23e2c8a0f1e978c8751013c7241c64b31487f0b6e5e7
glibc-langpack-de-2.28-225.el8_8.6.x86_64.rpm
372efdc3f332b71d39946a366cd7b134453fbdce82b3dbb3f4fd99be425db878
glibc-langpack-doi-2.28-225.el8_8.6.x86_64.rpm
00fe2db6fb22c3d104e3d8c26e8b1328f7fc04c5859830017fd109a56e7719c8
glibc-langpack-dsb-2.28-225.el8_8.6.x86_64.rpm
d3172bdfefb28621c81b15fe37f3e647145a345ce3920d28c573c7058f2d4dbe
glibc-langpack-dv-2.28-225.el8_8.6.x86_64.rpm
4ab842a38363d0e08e662a506628660028781280102d994c17618137d079c18d
glibc-langpack-dz-2.28-225.el8_8.6.x86_64.rpm
fdc498c441ba844df6972fa6d4e8663e693185ee7ff45924b5184746c00efd1b
glibc-langpack-el-2.28-225.el8_8.6.x86_64.rpm
643d70da5ea5aea17b29c1a70d281a9f2bf4e75f891bab186e7d5fe2d1119164
glibc-langpack-en-2.28-225.el8_8.6.x86_64.rpm
e50c5b78013f885b3aa03820452e89f5a201ec6de7c4acdb92ce2c50b95f5b92
glibc-langpack-eo-2.28-225.el8_8.6.x86_64.rpm
7bb756e4ea2550f91e0b7d472b46bdb6f6ae9416f0f1711a049a5a511b946389
glibc-langpack-es-2.28-225.el8_8.6.x86_64.rpm
87a859d740bade85ac5aebbf2d84ace9a59710b7443fb932e9fe66d23a2c2d77
glibc-langpack-et-2.28-225.el8_8.6.x86_64.rpm
f7bfac3de6c6a874d74e4ae1f3cf41175a7916b569d4a66d3e7bb1a38be48378
glibc-langpack-eu-2.28-225.el8_8.6.x86_64.rpm
48e521e1f9ca62e8639ed98895e0169c38b904b78669cc43a9c0c1ee2898ed06
glibc-langpack-fa-2.28-225.el8_8.6.x86_64.rpm
b8fc96437342d00097a350b41e09f9891bc0e0200d25fe831fe7676bf2ca686c
glibc-langpack-ff-2.28-225.el8_8.6.x86_64.rpm
4a0fc41ac90db32be7b8c49ba911f199ef2da3ce686e4f3717504e518e99a538
glibc-langpack-fi-2.28-225.el8_8.6.x86_64.rpm
e740cafffcdbafc99ffaf1116749b66684ac52184d75d27896b0bbc2a2d1d335
glibc-langpack-fil-2.28-225.el8_8.6.x86_64.rpm
653315ebd636c695236b8f1b79ae038262fe34476b1830e1533430632702522a
glibc-langpack-fo-2.28-225.el8_8.6.x86_64.rpm
ddc297c140b53043c2a444e66a8e82980b168a79405d2765d5e9040bd52313c7
glibc-langpack-fr-2.28-225.el8_8.6.x86_64.rpm
f19dc077c0190091631b5fd1a54a2bbddb03345fbb47294f3aaadf5aa1248677
glibc-langpack-fur-2.28-225.el8_8.6.x86_64.rpm
bde45f7976769fa1e560867a68d26cde4d34e4e534d69766e12b520965f99eef
glibc-langpack-fy-2.28-225.el8_8.6.x86_64.rpm
65a69b21dcf8e0bd1751520cc6d62c9c9414fdd05fa1ee76889e7e4cb2cab9c8
glibc-langpack-ga-2.28-225.el8_8.6.x86_64.rpm
4b5b37d47ded462e9e3436fc38efc25ebf922e274dd1397b340ea4be225a0b29
glibc-langpack-gd-2.28-225.el8_8.6.x86_64.rpm
f449869bdc7dde79ce5573aebaa3b9d7d66acd914e17aecf1c19ea3aff075ca5
glibc-langpack-gez-2.28-225.el8_8.6.x86_64.rpm
511f24a52b63296a6fafe018837865bd09b30f87e2db6ea93308c889566c9bd1
glibc-langpack-gl-2.28-225.el8_8.6.x86_64.rpm
9b4e49dec97ba1c17aec753b36719155d16dafeff7a21e3623cac883132d41e9
glibc-langpack-gu-2.28-225.el8_8.6.x86_64.rpm
e187de2c8f650ebbfe724cf39b44aa3f0f5030eff34ab9f1e4da69d44a8940c5
glibc-langpack-gv-2.28-225.el8_8.6.x86_64.rpm
d2455fcd0f92ed1d86f950d39755138675863c5d82874b22a2c1b1f2f3d8f18a
glibc-langpack-ha-2.28-225.el8_8.6.x86_64.rpm
cb149145050048eaf3aca36b6f1e7e3280e37b36cc8205371215a1e96ecc8a51
glibc-langpack-hak-2.28-225.el8_8.6.x86_64.rpm
3f1028cc04926d4c1920be522ecbfd58e462f57b01342aa997c8658b2a81aac9
glibc-langpack-he-2.28-225.el8_8.6.x86_64.rpm
9a59df052e3b9b3648cbd1eb9e4a9ac1c9619cfdf55b756b8a678b5b2d39c647
glibc-langpack-hi-2.28-225.el8_8.6.x86_64.rpm
36060c1484746bfe7ce4d7096bc291cf3bd21fda02f8168cc2edb8f71be315c0
glibc-langpack-hif-2.28-225.el8_8.6.x86_64.rpm
3b641b1ced439107c32cb2594689995e50a97bc362140e255566ba13cbaffd9e
glibc-langpack-hne-2.28-225.el8_8.6.x86_64.rpm
e0a4a41bb8fe2081e789a829a2139b4167014b62117d0cf9dfb733d01fef3d54
glibc-langpack-hr-2.28-225.el8_8.6.x86_64.rpm
fce670984e7dd4fb61eaad3d5ac012ed960802e472d68cead204e745be2b5435
glibc-langpack-hsb-2.28-225.el8_8.6.x86_64.rpm
f193ecc94675a6778c046dd3ca0a4fa5656e7827fe0b1900f044cff670fd4382
glibc-langpack-ht-2.28-225.el8_8.6.x86_64.rpm
e763c063306b93ab7e550d022bd0bee70d458e715d006992426367a3d2dd0a3a
glibc-langpack-hu-2.28-225.el8_8.6.x86_64.rpm
4ce68dedb9c832d1a005fbc297a0868d7ad3ec1f87818fc2efe8c91cfd772096
glibc-langpack-hy-2.28-225.el8_8.6.x86_64.rpm
576927b5e5f9915ebfef801f59aabe7a0b39fda36531b8fc246cc993c389d773
glibc-langpack-ia-2.28-225.el8_8.6.x86_64.rpm
0beeb985725bf0ae8092bd9c9bf5050811123831e95419b717e6420444fda36b
glibc-langpack-id-2.28-225.el8_8.6.x86_64.rpm
7cd6f1fc4ba92a2d3fa609fe4c984cef5519baf25a6e36d1cb32c13a51fd8e82
glibc-langpack-ig-2.28-225.el8_8.6.x86_64.rpm
8692525352ee73151963c8d499723348695ff97fdc8deaa4919a0b090a09420a
glibc-langpack-ik-2.28-225.el8_8.6.x86_64.rpm
3f5a3c55fbed82e172f3360e59b22629da787705a0999a5c58ded3e151f29d73
glibc-langpack-is-2.28-225.el8_8.6.x86_64.rpm
ea498f6d6be76a4c31049ff4cc0bf5b839535356693c7a568621863abaa156d1
glibc-langpack-it-2.28-225.el8_8.6.x86_64.rpm
5b0228bb27296f3ee1151c66a9e4191ad277b5cc5a7df4c9d9e54195b74ad472
glibc-langpack-iu-2.28-225.el8_8.6.x86_64.rpm
4b41dec8d1d10a91c1aa84758fb0ba0fecc68bdd58682ffdf578810047813bcc
glibc-langpack-ja-2.28-225.el8_8.6.x86_64.rpm
f6c923ef32fcce81ec8ed69febd319e83f458dd2da95118daef0753030549649
glibc-langpack-ka-2.28-225.el8_8.6.x86_64.rpm
4bb45a30e023e4bfcddcdbbea6ba96817e52c823c3b8f315b9e4c037b4e53bfe
glibc-langpack-kab-2.28-225.el8_8.6.x86_64.rpm
7c68fc66682c4c342594adf47567b258677554c105ea5277e366acc6ebd110b3
glibc-langpack-kk-2.28-225.el8_8.6.x86_64.rpm
b18a06d90e14868c29f5e6b79cd67e38cc25a27ebe8cee03e510d95280a0925b
glibc-langpack-kl-2.28-225.el8_8.6.x86_64.rpm
07fab5d54710ae9b56d1f1b1202f190b4e34cdb58ac32679a18177be06088ec6
glibc-langpack-km-2.28-225.el8_8.6.x86_64.rpm
1fcfe8b21bf3f7c8f6d0624a0ff212294053ae91812d17319d13bf0272176918
glibc-langpack-kn-2.28-225.el8_8.6.x86_64.rpm
164d4c9d5a290e46ff18550c56aadb7f330f7ddc5ad7978b28392874339c80d9
glibc-langpack-ko-2.28-225.el8_8.6.x86_64.rpm
4354cc4ac2c9463e15042fe9aea44e53757e7b88a53fbf614d0897abea8e9269
glibc-langpack-kok-2.28-225.el8_8.6.x86_64.rpm
99c30b1f16fc8d312f03dab4233434636c63d7fed061a22cd2b8170bbc9236ac
glibc-langpack-ks-2.28-225.el8_8.6.x86_64.rpm
14fb3b6cf1eb8db0ba95cc3cd06bbeaeeaca87bce3d947f72b0b67acc799facc
glibc-langpack-ku-2.28-225.el8_8.6.x86_64.rpm
5b10db154f4aa5f9a319acd5c10f4cc6c398c209337849da13389d1c065532dc
glibc-langpack-kw-2.28-225.el8_8.6.x86_64.rpm
bf0c3bce31ebfde1f3cafd2d1351493d7f2ad55366bdfb13476c1f85e79b480b
glibc-langpack-ky-2.28-225.el8_8.6.x86_64.rpm
2f557c8b992b6091ace8112b0269875d23d53eb7b00233ad809be6d7a44e796a
glibc-langpack-lb-2.28-225.el8_8.6.x86_64.rpm
4342b171a2ca7cd66b19b9739f8570f6b416258cbef07c82510739ef2942e0fb
glibc-langpack-lg-2.28-225.el8_8.6.x86_64.rpm
0c9199cfd88e2d75934e7a0c4c9151c6e1efb2d2efc3c063169a078157110b8d
glibc-langpack-li-2.28-225.el8_8.6.x86_64.rpm
f3ad4bcee4ad7e8b0be15db63f737904474c11deed27cd624ac399a429755342
glibc-langpack-lij-2.28-225.el8_8.6.x86_64.rpm
2b63511a575b09cc787af563c47807efe615c10e6a5f03a6172c37daa9155467
glibc-langpack-ln-2.28-225.el8_8.6.x86_64.rpm
20f19d53ac639025b897f6ad5697de6f1356e4c6e2cb4adfa595c3afa05515d6
glibc-langpack-lo-2.28-225.el8_8.6.x86_64.rpm
e3ada919bab425fdc188cd150ea9d5623ff7b054e3665d9443484f099be77ac8
glibc-langpack-lt-2.28-225.el8_8.6.x86_64.rpm
44799624e1f795d60c042b94160148f6cb6d56b706155e0143bdbbed6e489f47
glibc-langpack-lv-2.28-225.el8_8.6.x86_64.rpm
087ddae7196c9b45d5ef0cba0c964bb679d22eb89011bcc0ae4fb41df098d687
glibc-langpack-lzh-2.28-225.el8_8.6.x86_64.rpm
742760100f4c20e084d130d2b996b60bc4427386ed127d90ffc9712f8edcd61a
glibc-langpack-mag-2.28-225.el8_8.6.x86_64.rpm
d1620b1f3feedb5b32c9bac6c07b8a51e2efe7858b020cb3e1419d7743a7b4b2
glibc-langpack-mai-2.28-225.el8_8.6.x86_64.rpm
1e44fc5603a7547f9a4a56c469184f1b68bf4c91272090cc2267b8012f5c6d52
glibc-langpack-mfe-2.28-225.el8_8.6.x86_64.rpm
31067fc4bfbf3bb89ca0ab973ed807971afc4c7e354147d02ea0fa57394d3cec
glibc-langpack-mg-2.28-225.el8_8.6.x86_64.rpm
0051663124e8b2cfb0bfa63a18a8f309dc841aba7b66524ececbdf1d10e011fd
glibc-langpack-mhr-2.28-225.el8_8.6.x86_64.rpm
53a98611f8f8b6cb84c3db923a3678ab255f8873c042266bd7d9f9a412e100ba
glibc-langpack-mi-2.28-225.el8_8.6.x86_64.rpm
cad4c35698b57e1492c3d31560b542cedb6b94ee7731c0666cd4b9b256eddce6
glibc-langpack-miq-2.28-225.el8_8.6.x86_64.rpm
756a5dcbdfd4c26a8692fab0716b1a762ac1886bf0889cf0406a36a675c37ab9
glibc-langpack-mjw-2.28-225.el8_8.6.x86_64.rpm
67346f681cdcfd9ffb017852bc43db2cf272678fcff77163a87bef3d874de0dc
glibc-langpack-mk-2.28-225.el8_8.6.x86_64.rpm
f3c8d7fec374cfe19423141786e3e185784bf0848e2011e9ce8ca29f00bda770
glibc-langpack-ml-2.28-225.el8_8.6.x86_64.rpm
1ec720fb6cd199ff544d437d5abb664b552f9fee982f828f584b82ccfe1594e0
glibc-langpack-mn-2.28-225.el8_8.6.x86_64.rpm
94b6797a1c444ed0823d03fa74614479b40a75d60cd9b3c6dbb09b4238d34cdc
glibc-langpack-mni-2.28-225.el8_8.6.x86_64.rpm
2800bbfbe644ec4e5f56182026610bc65c91caba1cbae0258ba6d331c1d78156
glibc-langpack-mr-2.28-225.el8_8.6.x86_64.rpm
43a13514ede6dbd496171150448afebb2c885b39fe753ec9bf82212707507c75
glibc-langpack-ms-2.28-225.el8_8.6.x86_64.rpm
0a94e1d5886d5c32c0a8e71ff9a4daad6f1870907c0b71a9e8af1fc48c8d80e8
glibc-langpack-mt-2.28-225.el8_8.6.x86_64.rpm
d717aa500d3eee02cb0e8b4ef313a831574c47d26a2c56511b409b43a2afbf55
glibc-langpack-my-2.28-225.el8_8.6.x86_64.rpm
7113fff7ec5bd899fc582ce98cc62c8321bec8a1e5d41a8ce4c37c83ccebc294
glibc-langpack-nan-2.28-225.el8_8.6.x86_64.rpm
9844f3f957b4aba464f9582b0bc93f38d520081cf2ea3f3ade0999551f11b291
glibc-langpack-nb-2.28-225.el8_8.6.x86_64.rpm
ab5ca1d55202bde4170f920bbcc81bcd921bb3b841dc9e8d24ebcf9bf2c18bf3
glibc-langpack-nds-2.28-225.el8_8.6.x86_64.rpm
1bb920716ecee524aa0a42e37fc6a8f39e636161bb6a94c3226ad63144cb1d19
glibc-langpack-ne-2.28-225.el8_8.6.x86_64.rpm
8a9d797e5256bcdb27064289fa34ad3f7272416786fde8316fc057e76b60212a
glibc-langpack-nhn-2.28-225.el8_8.6.x86_64.rpm
bf1e7e41937d9fea34f3a28d3e9278019392ed51960d45bb7a8c00e7dfcd2813
glibc-langpack-niu-2.28-225.el8_8.6.x86_64.rpm
b1211a9cc01e159b452a2506451db8eb52d3227c78b73dfbda89506dc1d21133
glibc-langpack-nl-2.28-225.el8_8.6.x86_64.rpm
e8930cfad5f2a0de76973f794c1721e294b7d3a85fa507d5de8be4eee4b59227
glibc-langpack-nn-2.28-225.el8_8.6.x86_64.rpm
99d8fdfbbf9170f969faca0f7cd24e0fba5387aae8b520bd61614a2b6f32c12a
glibc-langpack-nr-2.28-225.el8_8.6.x86_64.rpm
65403ecc25d5644980e86bac5cc48d7194f60481aa954c059a40e0914d6775be
glibc-langpack-nso-2.28-225.el8_8.6.x86_64.rpm
6517f009fc6098c13955216832ab683421f7370979fab737cf252c0bffe1ac37
glibc-langpack-oc-2.28-225.el8_8.6.x86_64.rpm
48c451d2491820dc3b464d2207b11b040d27bd07b0ff699d503879df3fd383c0
glibc-langpack-om-2.28-225.el8_8.6.x86_64.rpm
c85c9b10abc5f10bf25cf1b00840fbaef901992650eb43b0b0d361b1de1530a8
glibc-langpack-or-2.28-225.el8_8.6.x86_64.rpm
0b447e08580e8f91c8a71dab03d71438e3d0d86986aeb4a779e7b138d091bbd4
glibc-langpack-os-2.28-225.el8_8.6.x86_64.rpm
c0ec891b7f65da69bae5962132d82305e8a886864e936a2f406c68b1109e3343
glibc-langpack-pa-2.28-225.el8_8.6.x86_64.rpm
a7bc31dd3e4711fde348f17a015618e9c405da1196cf30ffeef84cf30fede538
glibc-langpack-pap-2.28-225.el8_8.6.x86_64.rpm
383707e003cf12acc1373786f51572ab68515aebbf86a7bc24e8012be8a6f9df
glibc-langpack-pl-2.28-225.el8_8.6.x86_64.rpm
b9128ba5a2b06e951d4700477dacfaccedd0afad09c0fa8a2779cfe9492ffaba
glibc-langpack-ps-2.28-225.el8_8.6.x86_64.rpm
a96b498022f261186b0c65524ad20114e433548eab4c531f895e2248bf56a46c
glibc-langpack-pt-2.28-225.el8_8.6.x86_64.rpm
51ab34daac3e7b043acef093b5e82de0eda21943bac831ebb55f1b7a8faf025a
glibc-langpack-quz-2.28-225.el8_8.6.x86_64.rpm
1f96f9b6f9700b41f71c2c060a0e3ce6c726a25ec4b3ef5cdcdbbe0055538e6b
glibc-langpack-raj-2.28-225.el8_8.6.x86_64.rpm
0ee1c185f689d6512bd432d22aa48fb1793e1bcd676aff1a449d1003cfec32df
glibc-langpack-ro-2.28-225.el8_8.6.x86_64.rpm
99462f9e1fc96210f6b23de4cd20eeaaecf7d1cccd4698a99fdf2bdb1c4281cf
glibc-langpack-ru-2.28-225.el8_8.6.x86_64.rpm
a07d6ac3e9ff116a5adc2fbecd5dc242106187393949f913c9be44239f20b94a
glibc-langpack-rw-2.28-225.el8_8.6.x86_64.rpm
9ff46d171cca07fd7df6566114bca15335d1d8f22986930e4ac04ca704a668fe
glibc-langpack-sa-2.28-225.el8_8.6.x86_64.rpm
4934fbaa1d74bb7da2c962fb59f3c73e0bda043c9fefd0293113573d1f36389d
glibc-langpack-sah-2.28-225.el8_8.6.x86_64.rpm
15e12cf2e97db5fc5d4f9aa6790e70aea5778b9682f27407c9856ed4e8cc379d
glibc-langpack-sat-2.28-225.el8_8.6.x86_64.rpm
2fbb5d50453b60b237c1bf680392109b9bf491379aea423c7d3e1413e062fb1c
glibc-langpack-sc-2.28-225.el8_8.6.x86_64.rpm
cb67e5d776c197f436121d841b7b16d0dbb0f1942fa88fa2f31cd1112aa926ee
glibc-langpack-sd-2.28-225.el8_8.6.x86_64.rpm
1158f73ad54e4c2ec8df3edd92a010c447404d3c76c2f12f6d7f6844d9628c63
glibc-langpack-se-2.28-225.el8_8.6.x86_64.rpm
394a170ba0ff0555ec4d5905fd3fec581a6b2d27324cc153e9d7c8177760e7e0
glibc-langpack-sgs-2.28-225.el8_8.6.x86_64.rpm
1cd7029b298a4b42693783c965a6a2e5dfd518c0c5e69a2116b4d2e74357872e
glibc-langpack-shn-2.28-225.el8_8.6.x86_64.rpm
234329e061c2bbaade5db5a05a540c5fcdabde20ef8049236985fabc94d3e548
glibc-langpack-shs-2.28-225.el8_8.6.x86_64.rpm
5aeb489130fe8dd956e55bec77d5f9cb99829725ad022178cc5a3d48ca233037
glibc-langpack-si-2.28-225.el8_8.6.x86_64.rpm
18c5a1a6b3e064d5d7c5b04199002e5f37c40baf136e73d0a1830965c034d715
glibc-langpack-sid-2.28-225.el8_8.6.x86_64.rpm
2628b24eecde483c0022e1fa4dea95fb785347b5b3896b20e95110c8213a70e9
glibc-langpack-sk-2.28-225.el8_8.6.x86_64.rpm
ec54d5f336c72a3212778f1c0fd0be1c873bafa12e20c26f5b0ce1a3225e4a98
glibc-langpack-sl-2.28-225.el8_8.6.x86_64.rpm
2e574a37e5d61722e1ed06e844e1a0f774bc1a3b4f5340acd1569ab477b861f7
glibc-langpack-sm-2.28-225.el8_8.6.x86_64.rpm
9ff5ffa3df950fe98c7eb54aafa47d8af2c555709cb31bfd872452337166637e
glibc-langpack-so-2.28-225.el8_8.6.x86_64.rpm
c50d8dc9cfef9fccbb32624bd609452c2e214d9b4b5b7d8c292bc7fb4cb59386
glibc-langpack-sq-2.28-225.el8_8.6.x86_64.rpm
e425391e7ada79c289672aa295c7b0c66a88829c2b64ceb5ec70ca982f19dc42
glibc-langpack-sr-2.28-225.el8_8.6.x86_64.rpm
093b07e99c6308899ca01a538eb49e5b89730b153a1f8960ae3270788e753af1
glibc-langpack-ss-2.28-225.el8_8.6.x86_64.rpm
3b5a166cbb39d96f09f775fae61b85d37f6d5140250156a742fdb677eaee6c0f
glibc-langpack-st-2.28-225.el8_8.6.x86_64.rpm
68a8ff35796cc5d8cd00c4963b813e81ace2c43ad2533f4940053f2f7ccda447
glibc-langpack-sv-2.28-225.el8_8.6.x86_64.rpm
f2b12471ac7825ce1fdb460dbf5da3f6f03958c120e3570c31f39c47ff62297f
glibc-langpack-sw-2.28-225.el8_8.6.x86_64.rpm
cdc89efb4bab48069f5b2fadb64a643fc4cd50863b1163d05e84405a86439f73
glibc-langpack-szl-2.28-225.el8_8.6.x86_64.rpm
5e2c703e9f45cbeebdc46098e948316e6ebe674360e240b6806a7958c5e6cb0b
glibc-langpack-ta-2.28-225.el8_8.6.x86_64.rpm
ee10adb0b2854a41c16ebd3d9f336d69a21aedd96a3a839353e2cf5a80de08a9
glibc-langpack-tcy-2.28-225.el8_8.6.x86_64.rpm
f8d10280f6208e30368dc0f2d8dbe45ea7adbcfd421762c6610c15484354f0af
glibc-langpack-te-2.28-225.el8_8.6.x86_64.rpm
a8ff5e31d7cf192c9b4694dedb86417f757214b3bf1f9355d2dac825f8825b84
glibc-langpack-tg-2.28-225.el8_8.6.x86_64.rpm
137922a2530d414a3d303af77e1ea1b5496de024a612bfd12a0419df9a4a9f51
glibc-langpack-th-2.28-225.el8_8.6.x86_64.rpm
b66b6a20c479be1c59baa96adf9815019c32fc9836a2334a2f4a7891e9dbec3d
glibc-langpack-the-2.28-225.el8_8.6.x86_64.rpm
513ec9c727146da4a606644ac58114f9bee9056a1b00512258bbc59467fffd22
glibc-langpack-ti-2.28-225.el8_8.6.x86_64.rpm
f4425b7857b14fe8a2426d8ba5860ada374bb0c5444654f6fe05cdd59fe3096c
glibc-langpack-tig-2.28-225.el8_8.6.x86_64.rpm
376aaaafc05b607e79e546b2f95f1c12ebf2f8e8ae75072c945ef9b24a63b501
glibc-langpack-tk-2.28-225.el8_8.6.x86_64.rpm
0808373a62453114d9727285b8b11ebfb1053c944a0a03e43d28617d9cdac77f
glibc-langpack-tl-2.28-225.el8_8.6.x86_64.rpm
4b33fedb514a607a392fd2211ea0b818bff8fae5c15245af5c69ddc976b87f1a
glibc-langpack-tn-2.28-225.el8_8.6.x86_64.rpm
450de7f33f254f049bdacac877a007d1c6bd95b0bcebb2767bc09490462522d3
glibc-langpack-to-2.28-225.el8_8.6.x86_64.rpm
5d0809d12b8a497b309b6d9892a9c77d4cfcc2e01cff64f291d7063ec2b5eca2
glibc-langpack-tpi-2.28-225.el8_8.6.x86_64.rpm
b910838f46e6da6fc3cf2cc1303139d1f1fe122e0342a5f3aa8657a13acc9c01
glibc-langpack-tr-2.28-225.el8_8.6.x86_64.rpm
c27302bd149b126e86a44598af501ca8917fe25375bc50b14cdea6cbb9d28a3c
glibc-langpack-ts-2.28-225.el8_8.6.x86_64.rpm
85458f3b7161db62bc62960f7fde9310033547c1cec1c3ed8de739d20373fdc6
glibc-langpack-tt-2.28-225.el8_8.6.x86_64.rpm
56cfdbab52c5f680bec3f8251250fbf10c91818402578d3d0471ea0518b73c8d
glibc-langpack-ug-2.28-225.el8_8.6.x86_64.rpm
e84f8470ff5e176f1d72922d159916a8d5f83cce22beb93cf674db33a2f7a584
glibc-langpack-uk-2.28-225.el8_8.6.x86_64.rpm
5b768dc582dcfb417637ca078907c1e8aacee9774fce9332a66600f8928b2299
glibc-langpack-unm-2.28-225.el8_8.6.x86_64.rpm
06867a95668799ebc998eb3c030c516c29f1d55dd33bc33ed7cd02d505d9e2fb
glibc-langpack-ur-2.28-225.el8_8.6.x86_64.rpm
5871a229f4ad30c66ff5cc8fb1353e0a21bc9c4b5a503e3a861cff9de9536992
glibc-langpack-uz-2.28-225.el8_8.6.x86_64.rpm
ce8bdb18fb3ddeb2ab68e4b9d7228b6ce98748835d58e03bd6805bb6d7b9cd4c
glibc-langpack-ve-2.28-225.el8_8.6.x86_64.rpm
0c364019cca11e4d1d95da1fd4523d82dd22a62e3047e85c89b5b6b081fb1b88
glibc-langpack-vi-2.28-225.el8_8.6.x86_64.rpm
0b811802c153293cb9203d8826fa034ba67c51e4e6f0b4b0e1cead795fe08854
glibc-langpack-wa-2.28-225.el8_8.6.x86_64.rpm
e5703646937fa25b1b259f0325ee35be6eb00e0ccb7e8de12ef804417c1a2642
glibc-langpack-wae-2.28-225.el8_8.6.x86_64.rpm
607844db76d90573256716efcdb0812d75716ad4135e39a7474f5d7cf5c63ff0
glibc-langpack-wal-2.28-225.el8_8.6.x86_64.rpm
17f5fe27c1e19cfacf06ec25471732f8751df19383f8d303d7a2dcce5ecd9f24
glibc-langpack-wo-2.28-225.el8_8.6.x86_64.rpm
cd64e58fef883026c110cd329c7ccce5528da97c1757ad5e2177428e1019c986
glibc-langpack-xh-2.28-225.el8_8.6.x86_64.rpm
9d3feb744f5bdacd6062f73fe3bc0438e9afd346a5b50b31a508336ed98d8c90
glibc-langpack-yi-2.28-225.el8_8.6.x86_64.rpm
b3c55c76660db4d3e7ccb6c7969379dadb1e81909f70e1aca2fa267c666ebe53
glibc-langpack-yo-2.28-225.el8_8.6.x86_64.rpm
fe5144b5d523ce82f91fe0733a7f59c5162f44ba853fea898d91d2a59acb5d46
glibc-langpack-yue-2.28-225.el8_8.6.x86_64.rpm
5590c7c3177755374481c2f4592593b425bb1b64fef78892a5c89dc3053389af
glibc-langpack-yuw-2.28-225.el8_8.6.x86_64.rpm
2e4ce6c7d625d7a66e18bf59e4081255dc0125ddc6bace4ce281d376003a5312
glibc-langpack-zh-2.28-225.el8_8.6.x86_64.rpm
247e7a8a1b9b256418ee017012b6ab664d008c02d124e9533a5d5767159b1498
glibc-langpack-zu-2.28-225.el8_8.6.x86_64.rpm
21751537d8714c7195fe09018200f070413aa1bebc35abbe3c464c8d7352d201
glibc-locale-source-2.28-225.el8_8.6.x86_64.rpm
655d9df89cf4823f6078fa3cac5c8f4ae7fad3c4a865845ec234ec0bb3103ead
glibc-minimal-langpack-2.28-225.el8_8.6.x86_64.rpm
55c8f5ce51f0d74af05b0c12cc83c2646d23cbc7375006f03b3075a8816a0a3e
libnsl-2.28-225.el8_8.6.x86_64.rpm
a50434242a8f7f3343484bd6946a30d45e887850ef8c81ca325b4f5b4f8b1e53
nscd-2.28-225.el8_8.6.x86_64.rpm
174fc5c70faf26e0b0d5a0eacb53b3a5fb1490f5391e17d3c05a514cb9588d9f
nss_db-2.28-225.el8_8.6.x86_64.rpm
4516b0bfa07e8d93e4898a8153a3674fb18c6a323ea185a1289b910c84fb8deb
RLSA-2023:4517
Important: kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829)
* kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)
* kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)
* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101)
* Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602)
* LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375)
* ice: ptp4l cpu usage spikes (BZ#2203285)
* Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127)
* macvlan: backports from upstream (BZ#2209686)
* Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198)
* Incorrect target abort handling causes iscsi deadlock (BZ#2211494)
* swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513)
* BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658)
* Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667)
* Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373)
* Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451)
* Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189)
* ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366)
* xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281)
* jitter: Fix RCT/APT health test during initialization (BZ#2215079)
* aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498)
* Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543)
* rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769)
* Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829)
* kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)
* kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)
* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101)
* Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602)
* LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375)
* ice: ptp4l cpu usage spikes (BZ#2203285)
* Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127)
* macvlan: backports from upstream (BZ#2209686)
* Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198)
* Incorrect target abort handling causes iscsi deadlock (BZ#2211494)
* swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513)
* BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658)
* Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667)
* Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373)
* Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451)
* Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189)
* ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366)
* xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281)
* jitter: Fix RCT/APT health test during initialization (BZ#2215079)
* aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498)
* Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543)
* rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769)
* Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810)
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-477.21.1.el8_8.x86_64.rpm
55345b73e889ac316da109b4a88a1b72aec91de0c80690a851f0e4e4d07e8003
kernel-4.18.0-477.21.1.el8_8.x86_64.rpm
cf1102c68ce85a07d48c96945356e1ab2e55783d9cd0b2e6cfc753e261559fee
kernel-abi-stablelists-4.18.0-477.21.1.el8_8.noarch.rpm
46309ee4d8b9fc44ee2081582b47047f0a93384f1caacd47500761d3d10d5989
kernel-core-4.18.0-477.21.1.el8_8.x86_64.rpm
75cf4feb88db98f52e91dcb4c5df6496e31b4ed56e3d23df748379d911d17f88
kernel-cross-headers-4.18.0-477.21.1.el8_8.x86_64.rpm
98bce3ed3733138f3f97c8a520a729acec8c7d9bd4b38268c5c197e789b4294c
kernel-debug-4.18.0-477.21.1.el8_8.x86_64.rpm
48e4e3c4dae74640dbf9e27daa2b856d221dc6eecc9985818f543f497ba0c1be
kernel-debug-core-4.18.0-477.21.1.el8_8.x86_64.rpm
6e22930c356eba7e942415f9c6186481e1d17913859a37898a9c3b63cff0e2a8
kernel-debug-devel-4.18.0-477.21.1.el8_8.x86_64.rpm
e849119aaa97f48c41e1c0ec65694f03de86269d07b81af5797fdde2ed07a76c
kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64.rpm
06a4004f5bfe11fcba09b69cc403f96eb15151cc1204c8cb6e52c15b9d23f566
kernel-debug-modules-4.18.0-477.21.1.el8_8.x86_64.rpm
145b0b05912a5c49fc3dfb6bf0f0de05301e3642bacbd4925d1a7ab5e062c940
kernel-debug-modules-extra-4.18.0-477.21.1.el8_8.x86_64.rpm
2041cfc0e9a34287b8bac637c1ca97725499516f537220c2d9b6ff859ad48f06
kernel-devel-4.18.0-477.21.1.el8_8.x86_64.rpm
97df4be04c2ce5144abaf4d889f939b712292848ee25bce3b1c0727c61c98aaa
kernel-doc-4.18.0-477.21.1.el8_8.noarch.rpm
cdabad6a0fe918b3c9e54ab73b1565b64b75531e8b0141603cf529c46ece982f
kernel-headers-4.18.0-477.21.1.el8_8.x86_64.rpm
373d9be1ce3d412b5686c1bbc217c1c3b126a00cfb3c0ceae1beaa4045e46eed
kernel-modules-4.18.0-477.21.1.el8_8.x86_64.rpm
a285055b3088ea7cfcf211232ddfb3bbaf1e2fa5aa98e9f985e2f99a2f12781a
kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64.rpm
dfedb6684255aa891c0ec1964bdeb64d6cbb40033f35dc211e11774e27910c30
kernel-tools-4.18.0-477.21.1.el8_8.x86_64.rpm
57d60403751f5ba65429921f45e805ac6c87f3f1734c73c0acf8ca0ac3f80772
kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64.rpm
2d9b5cd526720670c2df470380037b6ec4e316d983884f1a013f2158e52440f9
perf-4.18.0-477.21.1.el8_8.x86_64.rpm
4ba1bafa870db7ee3ef8d44a359f83cf0107f19c56e6bb3a19f7c50d5dd01ae4
python3-perf-4.18.0-477.21.1.el8_8.x86_64.rpm
e701712a22ba072efcaa6d4ebfdbcc381ede0abac56f24dec7322fd94cff326b
RLBA-2023:4518
iscsi-initiator-utils bug fix update
The iscsi-initiator-utils packages provide the server daemon for the Internet
Small Computer System Interface (iSCSI) protocol, as well as the utility
programs used to manage it. The iSCSI protocol is a protocol for distributed
disk access using SCSI commands sent over Internet Protocol (IP) networks.
Bug Fix(es):
* Patch3 reverts a patch merged upstream (BZ#2215111)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iscsi-initiator-utils packages provide the server daemon for the Internet
Small Computer System Interface (iSCSI) protocol, as well as the utility
programs used to manage it. The iSCSI protocol is a protocol for distributed
disk access using SCSI commands sent over Internet Protocol (IP) networks.
Bug Fix(es):
* Patch3 reverts a patch merged upstream (BZ#2215111)
rocky-linux-8-x86-64-baseos-rpms
iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm
dc229689429dbfaaf1ea2509abe3728388c22acacec3e26a67167ed624e55013
iscsi-initiator-utils-iscsiuio-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm
74fb0e3dc4275d9055d6498112b8c2fe0d4150993c183232edfe6872130ccedd
python3-iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm
f10fda331d9ddec5cce76dde9443b6c58dc57de9b593a9d4d74ea03c6e1d670e
RLBA-2023:4521
NetworkManager bug fix update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es):
* VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es):
* VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899)
rocky-linux-8-x86-64-baseos-rpms
NetworkManager-1.40.16-4.el8_8.x86_64.rpm
dd6fe956eb9f152efd8ba9f4452cfe345012846b67f37016667e28e5529c6dc1
NetworkManager-adsl-1.40.16-4.el8_8.x86_64.rpm
c230e50306c7a5dd850e88caf026b6684b352598597fb7e0ac913cf4d380c570
NetworkManager-bluetooth-1.40.16-4.el8_8.x86_64.rpm
4b05e6da83dc34c9c100be5787fe0fc85ce33b7d6345e2af72454c56a2f35f14
NetworkManager-config-connectivity-redhat-1.40.16-4.el8_8.noarch.rpm
3fa816eb686a631eaf6dba0a376d071c52b04973b1a0a3fc863ece672f573c52
NetworkManager-config-server-1.40.16-4.el8_8.noarch.rpm
56e20b73c67df24520b3f71346b1151167269bb65cdceef53588df7fc8955432
NetworkManager-dispatcher-routing-rules-1.40.16-4.el8_8.noarch.rpm
861ccc3c0b0ec2b7714971e08282120aef53e31e667a3d23ac9b7013c0de1038
NetworkManager-initscripts-updown-1.40.16-4.el8_8.noarch.rpm
0cf9f96f80808ca6ce9804779d9efc64cc564c8b7cbb98afc5c5f1315e7340cd
NetworkManager-libnm-1.40.16-4.el8_8.x86_64.rpm
7d77e3830f82d731e46d8e58925f506c7dae25a7e5047bce61280b3285bda092
NetworkManager-ovs-1.40.16-4.el8_8.x86_64.rpm
0050dd48b556365092151ad021dc55fee60bc96feef716742fc734abe2459f7f
NetworkManager-ppp-1.40.16-4.el8_8.x86_64.rpm
83b4e6a4ba32dbd01b11ad673fcfd3d94eb2a3e3d479c44275f9f1d8df663d80
NetworkManager-team-1.40.16-4.el8_8.x86_64.rpm
7f7445900f0bc4d37d06fa80488fdf85ca0a4a89615822648883201cbcb267d4
NetworkManager-tui-1.40.16-4.el8_8.x86_64.rpm
f1e707a71f55065e501451e0fc94c873e1cdf4e7d0786ba5472160310af779b0
NetworkManager-wifi-1.40.16-4.el8_8.x86_64.rpm
1d6e45df32aee940e3a207823a8490286b141fd3a7215ec456099427979e655a
NetworkManager-wwan-1.40.16-4.el8_8.x86_64.rpm
b4dc38fd5c8553cd8902317e6ae5c494c9c39966fdf875716cc08c3e6cb44af8
RLSA-2023:4523
Moderate: curl security update
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: GSS delegation too eager connection re-use (CVE-2023-27536)
* curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: GSS delegation too eager connection re-use (CVE-2023-27536)
* curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
curl-7.61.1-30.el8_8.3.x86_64.rpm
ed2fd88c5440ecca9540d7dab76ebbc3fcea69e9f773128c8c719f0b61ae9627
libcurl-7.61.1-30.el8_8.3.x86_64.rpm
8140b42a09de333a2a8534b8386f7a4fe9b1ea727543c1dea381f7575e90539c
libcurl-devel-7.61.1-30.el8_8.3.x86_64.rpm
22cf4d9837c5de50a0925964af93e80104776f32bd891e77fd5dc1c90f3212a7
libcurl-minimal-7.61.1-30.el8_8.3.x86_64.rpm
e2755e4f7816cce3e652dd3dfcb98480ef83724ea5033b6242186c0ab4d64d66
RLBA-2023:4522
grub2 bug fix update
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es):
* HTTP boot issue on RL300 (BZ#2221202)
* Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es):
* HTTP boot issue on RL300 (BZ#2221202)
* Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972)
rocky-linux-8-x86-64-baseos-rpms
grub2-common-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
a419f460ebd079f4838ee8b3f35e862106c969e5530702380e708ecba8047992
grub2-efi-aa64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
f88cc3e63d47e8eb411a43fd713c961c90f355f4056cfbfb70d3145155c273c0
grub2-efi-ia32-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
b1552265ce9c6812688d394a2fdf9c93c2a729d4a3049363540d38cd72eb3245
grub2-efi-ia32-cdboot-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
88a1c8d600e0889db45977df024a9c15953dae2bc1f31e38334a606b393df488
grub2-efi-ia32-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
4d033cf7ef4c6deb674888486a6eeef5bc976f23e3aec92db83a759a71e430bb
grub2-efi-x64-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
d1942f696fb2761c54eb34fa66e64ee9233e89cd882c96c3d2914204a09d6070
grub2-efi-x64-cdboot-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
ab446b51edb4bb7cb089efbc14522a7a941f7cf8610eac701105aea150db197d
grub2-efi-x64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
ea5673584ba5557b92e950255c9746c4925a1ce4557a54993955e9dcbc11444e
grub2-pc-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
8f94bb2c9dfb1465fa0c8163ab641b2f581ab250735c319f80ffa26ba878a061
grub2-pc-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
a177c63e0f25d5da4afafc7ffacbf31c76f6a1105321cce74d755682d3811c17
grub2-tools-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
7c724479d906b9606037eef80e0039e0fae8d8d5ae5716687bd2f04496089a4f
grub2-tools-efi-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
ae1f4704b0c6bc82e779c572a3d6469e35e03279cb4a65bfc66cf3302d18d3a3
grub2-tools-extra-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
e039fe406ff0c98f589da5326bf3370c20ded57ff6b75e87077eea4130375747
grub2-tools-minimal-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
ce1fb9f8e0d85fcc36a3a54f5cf82489049ddb512afa09b75820a287d35056ce
RLBA-2023:4525
sssd bug fix update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838)
* SSSD enters failed state after heavy load in the system. (BZ#2219351)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838)
* SSSD enters failed state after heavy load in the system. (BZ#2219351)
rocky-linux-8-x86-64-baseos-rpms
libipa_hbac-2.8.2-3.el8_8.x86_64.rpm
70766413d5a52c92e3bb224459f8184c02518f8630d1073b63b593cb28b7b37d
libsss_autofs-2.8.2-3.el8_8.x86_64.rpm
8edee8b77c8b3bf56e7ec9a011505114055ab8b7f5a31a436182e80ea297785f
libsss_certmap-2.8.2-3.el8_8.x86_64.rpm
1d48fe634b4c5d4069677150595ce30f17d4e0c9716e613126e829550ecc187f
libsss_idmap-2.8.2-3.el8_8.x86_64.rpm
66dc16e4d6a65e569d2a6ffcba6c64936bcbd8a3e1fa65d8ea34d044269a5aab
libsss_nss_idmap-2.8.2-3.el8_8.x86_64.rpm
71c3f8b5a754793861fc5ba41c1f1ee9507f526522ac5f4cca3b01577ec4234e
libsss_simpleifp-2.8.2-3.el8_8.x86_64.rpm
f2608aa7f0de0e59272baf812a973432cf633da9a41b3f1cd3e0d6f65c7f501b
libsss_sudo-2.8.2-3.el8_8.x86_64.rpm
4f470f35ba8acc9385ae63a95583a8c82d2acfeaa0b6773b19b797736dfd94d6
python3-libipa_hbac-2.8.2-3.el8_8.x86_64.rpm
06012e2efb30f8a70e2646433d3b1126ec476e6ca53b426bd4c0c4346f2580e1
python3-libsss_nss_idmap-2.8.2-3.el8_8.x86_64.rpm
4dda9c68f5ee0fedd47a6197c62754e85eb6bf1601b38934623a6b13c1fd5228
python3-sss-2.8.2-3.el8_8.x86_64.rpm
a213d7e10a526fbf5eec531ae3b6c670889459b3a114a1bf103011203434ac1d
python3-sssdconfig-2.8.2-3.el8_8.noarch.rpm
a5f0f60d75de585d424896b1228fcfb9d99c3514e69ac32931a7b926d77eb49d
python3-sss-murmur-2.8.2-3.el8_8.x86_64.rpm
4717eacd40c9038e56c756578e29c4fe13f7186040a85a9fc0043867a6de941e
sssd-2.8.2-3.el8_8.x86_64.rpm
7b9dbf4fd5869bdd1cd44387a8fc71117a178c38ec0c150c2d4bf4e3051c67e7
sssd-ad-2.8.2-3.el8_8.x86_64.rpm
9db0f73f65cd73beebb4de4fa717fad97ed60999d3dbf6a2bc170c12030d62e8
sssd-client-2.8.2-3.el8_8.x86_64.rpm
d926b55209f8bbaf4db84b629adf3d314abbd6e8116f7319976428fdf3591280
sssd-common-2.8.2-3.el8_8.x86_64.rpm
a2d4bc97be471d65ddbb5297c7fc80e2aee8230e9c126aa3c7849012aae1b35f
sssd-common-pac-2.8.2-3.el8_8.x86_64.rpm
41e550c5b5ba11583faa82b89757786ad8c536698f4a4db6e9589474da9729f3
sssd-dbus-2.8.2-3.el8_8.x86_64.rpm
c964249621dbbc788cef2b5489dffad152f80aab220bfdf9f6c5a3e244d8d022
sssd-ipa-2.8.2-3.el8_8.x86_64.rpm
21341643762afa65d3cea2f97d21b4c14331b7ee8536a4a35a0af9b96464272d
sssd-kcm-2.8.2-3.el8_8.x86_64.rpm
139984608f31a9c073f8538c447636c92f9e682f277654a76d36a8ac0350d06b
sssd-krb5-2.8.2-3.el8_8.x86_64.rpm
60d2b12e295096dc2eea423028955460243b93cfb9149d0458a75fb629664a76
sssd-krb5-common-2.8.2-3.el8_8.x86_64.rpm
b68513cd3f38df8e748e1815c95234537f4c23e21ca12f2417a39a1135eccab8
sssd-ldap-2.8.2-3.el8_8.x86_64.rpm
0f7fdda9309f544793fbfde4576c4f3c40ef600b1d5fdabce2c1270e9fa66cf6
sssd-nfs-idmap-2.8.2-3.el8_8.x86_64.rpm
81fb82f432216f562a6864310c775e86b7ea3376ab615550362bfabe6b23d2be
sssd-polkit-rules-2.8.2-3.el8_8.x86_64.rpm
e219019be7072c8adb77048527522a276bb8521220361294c9ed56319c00050d
sssd-proxy-2.8.2-3.el8_8.x86_64.rpm
79680b5e0c1ac8430cb2c442c96e5a8e4d2dcd963430675d39a55d9e62afc63d
sssd-tools-2.8.2-3.el8_8.x86_64.rpm
2ba37a5bfc294b077df409d870c48a8e414dc6e1f89b09030c6c0731f157284c
sssd-winbind-idmap-2.8.2-3.el8_8.x86_64.rpm
6a34af96ec51fcef77da677b1403f4436d87c5fd9ac8c2746d436c9ef44fff57
RLBA-2023:4526
systemd bug fix update
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602)
rocky-linux-8-x86-64-baseos-rpms
systemd-239-74.el8_8.3.x86_64.rpm
d3a7490b43fe7177e2527ce158382812fb2432efbe60e9157d386e8675685fc3
systemd-container-239-74.el8_8.3.x86_64.rpm
43c10ceb96682d069179c98f88f4fed1310b8cfd4fa1bcfd45625ee0ba01c4bd
systemd-devel-239-74.el8_8.3.x86_64.rpm
16cbde9776616e5d7e62f9100fb4d21ff84657b1c85d9beda6a2b01806d138c9
systemd-journal-remote-239-74.el8_8.3.x86_64.rpm
4d2b0275d3104dfc528af376f7c77a0f947eddf5b16574c690e0ab6a3d4ee7e1
systemd-libs-239-74.el8_8.3.x86_64.rpm
bb8302d0082c3d3c6025e151f347dda507476135ef10ac16726d6969493d3997
systemd-pam-239-74.el8_8.3.x86_64.rpm
81495002cd02850cb9a9b8c9b07b18e1b4e0281fa59bd7e57c034be165f3a763
systemd-tests-239-74.el8_8.3.x86_64.rpm
d3d56b9ec25c1f5529080d356d201829feb4d2c4244ba3f19a535e2b981c46bd
systemd-udev-239-74.el8_8.3.x86_64.rpm
b7a741f10f900f6d093560ab546508a8e61a12ddeb0f15c6060553e33e0e321b
RLSA-2023:4529
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484)
* libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484)
* libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libxml2-2.9.7-16.el8_8.1.x86_64.rpm
74abab4edeffd38c30737de94a392346d245af9b30bd1b298fb456af50de721e
python3-libxml2-2.9.7-16.el8_8.1.x86_64.rpm
5daf6a85973edba5c14a07cefac1e2579728c79b8e9be640869f4d6b0bcd47ca
RLBA-2023:6797
xfsdump bug fix and enhancement update
The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems.
Bug Fix(es) and Enhancement(s):
* xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493)
* xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344)
* xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems.
Bug Fix(es) and Enhancement(s):
* xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493)
* xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344)
* xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677)
rocky-linux-8-x86-64-baseos-rpms
xfsdump-3.1.8-5.el8_8.x86_64.rpm
832a4dc59a3ad9e62a2e8d594b6eda910d712ea2e822a8b4fbc7ed7ef2f0c4c8
RLBA-2023:7080
kexec-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kexec-tools-2.0.26-8.el8.x86_64.rpm
9ae81e7de390624533ad29cd87f19744783e988cf66af60faf7e2af8d14244e2
RLBA-2023:7182
tuned bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tuned-2.21.0-1.el8_9.noarch.rpm
ef47db5a44f0baf742d952864f77eb147a5f08e31b46a9e5d8882fa0990187b6
tuned-profiles-atomic-2.21.0-1.el8_9.noarch.rpm
98a338f12a63020fcdf807492e79f6ed8d4076da7c2c3b82a35012634f5a8477
tuned-profiles-compat-2.21.0-1.el8_9.noarch.rpm
37181c66d77dba3580bb77f2ea8938ade58f363239abbd5a6968f04baadc28c5
tuned-profiles-cpu-partitioning-2.21.0-1.el8_9.noarch.rpm
cb9a5795f21ab5e4507f69cb4db2f33a02096f205036d669930cc1fe2a5abe6e
tuned-profiles-mssql-2.21.0-1.el8_9.noarch.rpm
13487cb712d7a39c5f61b9f63001683d8ef43a66336b819154c9d0ababcdffe7
tuned-profiles-oracle-2.21.0-1.el8_9.noarch.rpm
fd5ed5219eaf524c75e2fe142df87fcca0b86c4c5faafda6229c0e92f24cbef6
RLBA-2023:7185
nftables bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
nftables-1.0.4-3.el8_9.x86_64.rpm
5054bf9eab20fdbc97bc47f1d30a3fd1e80cefa915d0e634c865b4fd8095996f
python3-nftables-1.0.4-3.el8_9.x86_64.rpm
19ac6c94f37f8224301db112ecabc9fe3c1e123630c91ad1e8df500956db9eb5
RLBA-2023:7186
util-linux bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libblkid-2.32.1-43.el8.x86_64.rpm
ea6bbe1d9b8b42e1ba582cf1c67a8a9e95b2a7bea96751576d1a32f324f5fcdf
libblkid-devel-2.32.1-43.el8.x86_64.rpm
43053d38b46a6a5aa1d9087b939109a265c1816deadc9916ac3d464ff6ecd490
libfdisk-2.32.1-43.el8.x86_64.rpm
25a410dd430b16e2269f55c6036c7e4946f81d932fe5a98e072a61c48f947ef7
libfdisk-devel-2.32.1-43.el8.x86_64.rpm
2ed6acd763040b750875464f8560ee078b22546cd7d1701176355499b30fd237
libmount-2.32.1-43.el8.x86_64.rpm
043db826bf4e77a522b64bea03fc63dbd5ae29c23fdd4ddfcb527742afc5700e
libsmartcols-2.32.1-43.el8.x86_64.rpm
28a333ebe4ecaa606c1a67726afafc3db9ce46be48bd832f6c0ec59bc7f6e82b
libsmartcols-devel-2.32.1-43.el8.x86_64.rpm
53f0f834cdc59c7fa61b21eab0ed656b69c4454f5300eb46645c7f6b16a87ca6
libuuid-2.32.1-43.el8.x86_64.rpm
99e83acda94db42e74928e773ea02dcd59143baf7d8412c445a0fe3d2cedfd79
libuuid-devel-2.32.1-43.el8.x86_64.rpm
8b23849fceb27df7dffe78f209151e7536ef38d98253afbde350e1a0bf1e4c25
util-linux-2.32.1-43.el8.x86_64.rpm
9bd12357e95be98bfc51645ddea9724521b4bb0aaba87d107b308d0225059465
util-linux-user-2.32.1-43.el8.x86_64.rpm
bfb7ad5153c88e3ef6440af9b8d17574973a4348b78960f64ff850ba7eacb6d3
uuidd-2.32.1-43.el8.x86_64.rpm
8bf822c883b4547e8b53c2c6cd39aa4fc4d051935dd22881ae504d600df75805
RLBA-2023:7188
dmidecode bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dmidecode-3.3-5.el8.x86_64.rpm
b7149e0e49e75548a936ad601c0b87936a0b60d5e8e8537d7f5666ade450dc56
RLSA-2023:7187
Low: procps-ng security update
The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.
Security Fix(es):
* procps: ps buffer overflow (CVE-2023-4016)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for procps-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.
Security Fix(es):
* procps: ps buffer overflow (CVE-2023-4016)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
procps-ng-3.3.15-14.el8.x86_64.rpm
cbbd805508836bbc260c452a30a534c89e41863a3c129bb863448732f8cd6e1e
procps-ng-i18n-3.3.15-14.el8.noarch.rpm
821a3db12b38137553beaab052f93c3223d3952bf1db6458042609122e967dbd
RLSA-2023:7189
Moderate: fwupd security update
The fwupd packages provide a service that allows session software to update device firmware.
Security Fix(es):
* fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fwupd packages provide a service that allows session software to update device firmware.
Security Fix(es):
* fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
fwupd-1.7.8-2.el8.rocky.0.1.x86_64.rpm
f0ac61cc2555853e24b8be27f65ce062ffb61f5445164b7a83083f2cabbe1232
RLSA-2023:7190
Moderate: avahi security update
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
avahi-0.7-21.el8.x86_64.rpm
f8f0eec1cc1075ba639588cd28af6b9cb89df6fd29279271037190b836eefa9a
avahi-autoipd-0.7-21.el8.x86_64.rpm
a27aac9bc18aeb6e011d0a4847e989724c51b7bd6818912c896049e9ce31156b
avahi-glib-0.7-21.el8.x86_64.rpm
212054d8ab063917f7a442e251c61a1b7628ed59fdda6346ff191e41cf2bc34d
avahi-gobject-0.7-21.el8.x86_64.rpm
27941dc85d64a04023074171f346fe87e2422656318e0c8385221a962cb3c155
avahi-libs-0.7-21.el8.x86_64.rpm
5f2fa3639ff92a250a251d5b3bbf8487cdccc1fd70abddeca9a2f39ce20bffb5
python3-avahi-0.7-21.el8.x86_64.rpm
483f92f1f8f393fac6d7ac81e04c13b7d3bb30d7179d445fcec45fa006d94b8e
RLBA-2023:7191
lvm2 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
device-mapper-1.02.181-13.el8_9.x86_64.rpm
529004b1bfd6befc13b3105df4c991ce80b6c660d3dc63819b347029773092ff
device-mapper-event-1.02.181-13.el8_9.x86_64.rpm
0343b170f441a5d3a8a33ed1e1653d14fe321bba186f108a1573cf814f5b3fe3
device-mapper-event-libs-1.02.181-13.el8_9.x86_64.rpm
b88ef7e099f9a3f4ad6ffed923f9179b1a705ba8075e61ec93ed55a249013c04
device-mapper-libs-1.02.181-13.el8_9.x86_64.rpm
081444cffaf1a52e81caa4fed8a655a4e53ff84fadd33d6eb27627ee8201bfb1
lvm2-2.03.14-13.el8_9.x86_64.rpm
5c31188a205a414e8334462fcfc8432522d7a7df35dddf016c0c2a4478320c66
lvm2-dbusd-2.03.14-13.el8_9.noarch.rpm
a8519cf7f02e592e61b33dbda1b53c5467356db8be66948b81b0ff9ec49ce711
lvm2-libs-2.03.14-13.el8_9.x86_64.rpm
706102f2a090bb435e1161e30b3347274ac7c8199d252579207d1b095e7905c3
lvm2-lockd-2.03.14-13.el8_9.x86_64.rpm
8fca5e0cf94f1cd227a08673fc59f571a04a5dc3f28d065cce937c75628f0166
RLBA-2023:7192
numactl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numactl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
numactl-2.0.16-1.el8.x86_64.rpm
60ea415c6376e01845cfd49758b44ac0841ed035bc5183260aa3322922b1e1f0
numactl-devel-2.0.16-1.el8.x86_64.rpm
c9ce8a9ff18efe9bf5e69b1cb9fcb128d8bf89f34749cd9d05d03d5c7bd8b0f5
numactl-libs-2.0.16-1.el8.x86_64.rpm
fc54a273a43348ded02eb1966b9607447d5cf527669250c67c21c18762966860
RLSA-2023:7207
Moderate: c-ares security update
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
c-ares-1.13.0-9.el8_9.1.x86_64.rpm
405c835c82f99de95b80bccd85a90e821d67204ca13036968c85cda20d0830b2
c-ares-devel-1.13.0-9.el8_9.1.x86_64.rpm
fa74fa0269e0e94dbb8c0cd07df0da96094049e88b51e64e2022a5f1cf55785b
RLBA-2023:7210
sssd bug fix update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414)
* SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414)
* SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302)
rocky-linux-8-x86-64-baseos-rpms
libipa_hbac-2.9.1-4.el8_9.x86_64.rpm
073fcab34ee74a862843e1186c6c469304c6ea96dd960639ad7e655e2f7d866a
libsss_autofs-2.9.1-4.el8_9.x86_64.rpm
fe30cb8c8c429d5eae9c2b0ecd21fe6e1999284d574658fd1bfce7f8152fe7b4
libsss_certmap-2.9.1-4.el8_9.x86_64.rpm
72e1960b515f57e8aa01be969c75def7d14bb1c208eb5f9cac8c9f96f3276332
libsss_idmap-2.9.1-4.el8_9.x86_64.rpm
29512c90e2b57634c5b7f1afaaf9819777e6bf91e1c87f9c7663b520f31d5edd
libsss_nss_idmap-2.9.1-4.el8_9.x86_64.rpm
8492e5783fbcd71072b998aef57d61fae9215a3f1f6a6353559790ee77317198
libsss_simpleifp-2.9.1-4.el8_9.x86_64.rpm
3fe441649687d6bf3991b3288eb19742fcb9f476bac1f34368a4952a39a26c71
libsss_sudo-2.9.1-4.el8_9.x86_64.rpm
a5f9f3cbab2721a11fe241f0ffe8a6e7d5bfd7fa70f9f05bbf7cacd6c8252d95
python3-libipa_hbac-2.9.1-4.el8_9.x86_64.rpm
ce3f2e441b967cc4324e5dc5f9591f4803a6e2e06efd6f46de32a3bffd9f78fd
python3-libsss_nss_idmap-2.9.1-4.el8_9.x86_64.rpm
a0fc3ae4e61f08f667e97c01df71decb833448357a583266ee044865f7e491f1
python3-sss-2.9.1-4.el8_9.x86_64.rpm
5591af507fd55def3ecf1896b2bb132116440fb1ffed9b3eeaa2952ef791e424
python3-sssdconfig-2.9.1-4.el8_9.noarch.rpm
b148427ebe8ec952f6cafa76baaa0c3d10cea8d467e4da4c60b3907c08fdfa3a
python3-sss-murmur-2.9.1-4.el8_9.x86_64.rpm
a171db8ded3d0aa02acf774add36da10dccab762d9019c26354a9954ea7fb268
sssd-2.9.1-4.el8_9.x86_64.rpm
a38bd72377448d7883ad701cfa9ba68d873667a78ad3c508f433bdd3c0b4b62c
sssd-ad-2.9.1-4.el8_9.x86_64.rpm
f1597c9b264e87903e49cf8bd678848c7dec60aa89cdd144c09f187b0813fbc2
sssd-client-2.9.1-4.el8_9.x86_64.rpm
e5fccf67b0feafc4487c487e5253926790ad8d3c021ed46f3011d79c709cbfba
sssd-common-2.9.1-4.el8_9.x86_64.rpm
f59dbd72a22aa9d1adc39b656b675dd3f93488ed4159a5eff27b9b2c3d7ca183
sssd-common-pac-2.9.1-4.el8_9.x86_64.rpm
37c0d94f9f09f3734a5a7a813da47de043aaf5e46f80f198c0fdeb9a17bbe792
sssd-dbus-2.9.1-4.el8_9.x86_64.rpm
6093c7927cbbd6c21091d70afefe59b988475036590ae42ca60d616dfaadc91c
sssd-ipa-2.9.1-4.el8_9.x86_64.rpm
f06c63e4bd1bd4ce087618360e5b442f9f6a33bb3e9de1c410cd8e802a3ddea3
sssd-kcm-2.9.1-4.el8_9.x86_64.rpm
daf0145eb64ea43ac2c9f9d2d1ed0f8c4d7bd7bccf70cc512bdde7482cfe0eb2
sssd-krb5-2.9.1-4.el8_9.x86_64.rpm
7e0b92f6ac339d63a2ed8b8a10ac008c8963bc2d5aaa9f459a726367b9798d1d
sssd-krb5-common-2.9.1-4.el8_9.x86_64.rpm
245d72a2ca2153cc215493e5902e4aaf3b623d119036dea5fea1311bb6b629b5
sssd-ldap-2.9.1-4.el8_9.x86_64.rpm
5541cd682ad7602ed72f7f59caa2fcd6b4fc63730596c0d0cfbf2ac9f28f7943
sssd-nfs-idmap-2.9.1-4.el8_9.x86_64.rpm
e4f04e49a04e87160ce729d3035ac7abd3ac329068d8d4481f0c9974555817e9
sssd-polkit-rules-2.9.1-4.el8_9.x86_64.rpm
8de4c0d6022279dbfe6bfac633ab8b74ca9c552006f1caa208217f25ab3feafd
sssd-proxy-2.9.1-4.el8_9.x86_64.rpm
fc04e93bd4c9f2770e0f8eaf75ef78a5067cc59831da2a3909478bb8ed89e67d
sssd-tools-2.9.1-4.el8_9.x86_64.rpm
53aa6aba3d4bdcc837ef408c6ea5615b4a07138a18063936067540b82e8af295
sssd-winbind-idmap-2.9.1-4.el8_9.x86_64.rpm
da00ac04183957743400e0ab305053b6c107e3c423bfabe98ddd2959dba1bb29
RLBA-2023:7211
krb5 bug fix update
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Bug Fix(es):
* Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Bug Fix(es):
* Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514)
rocky-linux-8-x86-64-baseos-rpms
krb5-devel-1.18.2-26.el8.x86_64.rpm
7a45a46f6debb2f19c95c3a9a6399edfb10210cd0762fe672f6cb270359e03a7
krb5-libs-1.18.2-26.el8.x86_64.rpm
bea60f99cd8adc50dc741aa911ed1a38c89e2a6d5bedcb763e32f10b045bc319
krb5-pkinit-1.18.2-26.el8.x86_64.rpm
e8f4443cc49a23c23d4408c6fe53f345fe08400c16b48499c7e266f62c7866d1
krb5-server-1.18.2-26.el8.x86_64.rpm
3d1b472e1dfa1a02a082e983757db1f36aca29811923d52fe6b93f628a81c777
krb5-server-ldap-1.18.2-26.el8.x86_64.rpm
885d066ddb7462d36c8cfa6e9ae0f0bace3cbaf67399016ebec2889fdd09c02d
krb5-workstation-1.18.2-26.el8.x86_64.rpm
a6e5e4a0d9afc85aac2d3fd7d3caff64942dc9e530b8c1dfe922bafce0238c46
libkadm5-1.18.2-26.el8.x86_64.rpm
bcf270ea041d0e9bf071b3fad421121cbd1d006acaec202d9e551d8562d2b1cc
RLEA-2023:7250
microcode_ctl bug fix and enhancement update
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (Rocky Linux-15864)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (Rocky Linux-15864)
rocky-linux-8-x86-64-baseos-rpms
microcode_ctl-20230808-2.20231009.1.el8_9.x86_64.rpm
ed6bd8bb64fd669ce22c878f610109bb5cd4c31ba64821593ebbeb463da4318e
RLBA-2024:0111
selinux-policy bug fix update
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es):
* Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427)
* AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es):
* Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427)
* AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274)
rocky-linux-8-x86-64-baseos-rpms
selinux-policy-3.14.3-128.el8_9.1.noarch.rpm
c7433d674d6f5d9a7a8bf0ea180d467e6f68f113ad23a099be84b71ca8a56c03
selinux-policy-devel-3.14.3-128.el8_9.1.noarch.rpm
7fe0299de89fcebcf37a86be62b57736b0c5557f4d182a664a3ec58d16989d1a
selinux-policy-doc-3.14.3-128.el8_9.1.noarch.rpm
9471f6adb2710ed4bfcc6695e4bd72e84b0f4c79d9717d554a585ff319b63eff
selinux-policy-minimum-3.14.3-128.el8_9.1.noarch.rpm
072fc4d0e4315817acb5b0ce0f1bc930e81f9c22c604e2870c133ff77f74ef3b
selinux-policy-mls-3.14.3-128.el8_9.1.noarch.rpm
0d1ad8a88f168fb39c385ab5e4da73b2c458a9b4b06dff84896f688f2ecf1c6e
selinux-policy-sandbox-3.14.3-128.el8_9.1.noarch.rpm
3e3c5e2e37404331b64f013dd313d08444612b6bffa1114de993772973492762
selinux-policy-targeted-3.14.3-128.el8_9.1.noarch.rpm
7e06389eb99b9c66b0cf8e3459816672d2603a5b87094c6ba8bb7e56c95c5dd2
RLBA-2024:0117
libcap bug fix update
Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities.
Bug Fix(es):
* libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities.
Bug Fix(es):
* libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362)
rocky-linux-8-x86-64-baseos-rpms
libcap-2.48-6.el8_9.x86_64.rpm
1d7e73484f9be2f94802516786c5218d01d7c8c297369e6b7c9fac4d7e9b67a8
libcap-devel-2.48-6.el8_9.x86_64.rpm
64a4046e694c5b4ce148de9caad17b8d331b3f708c23b2365a86f7af99b64a83
RLBA-2024:0118
xfsdump bug fix update
The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems.
Bug Fix(es):
* xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems.
Bug Fix(es):
* xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494)
rocky-linux-8-x86-64-baseos-rpms
xfsdump-3.1.8-7.el8_9.x86_64.rpm
80d43fca687ae6c8d19200488d42b0a93f616b240c30d70001dfcf9c81169366
RLSA-2024:0155
Moderate: gnutls security update
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
gnutls-3.6.16-8.el8_9.x86_64.rpm
a6c6051da918f40eb7f4952645a2ad12f9143f254336f9a982349b2bb1a3502c
RLSA-2024:0253
Moderate: sqlite security update
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
sqlite-3.26.0-19.el8_9.x86_64.rpm
88da14af450d5762afe0edb15216ea2738a217793475ecb5d2993123c0538556
sqlite-devel-3.26.0-19.el8_9.x86_64.rpm
1350a240e67a80c082b21a799a1a368ef0f4c355950bad72a71ab55b9a6bc258
sqlite-doc-3.26.0-19.el8_9.noarch.rpm
062df3cfd98abe04f209e6412438476e99f396b73ff1308ba4ec9c799a482e79
sqlite-libs-3.26.0-19.el8_9.x86_64.rpm
9ee554eb9a65df5f5295a37c860bb32dbddc4731223a980f849d2068c6fb33ed
RLSA-2024:0256
Moderate: python3 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm
00c6d17ed20bf8f01d7375497ac5ba77990dbbc45c02e37bdc097a095e44f541
python3-libs-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm
3117a3990aa7596483a4a3b62a0d4f5d7e83a21c4a690cd2b0b8bcd9231173cc
python3-test-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm
906e37f205f0a62cf9770261f01a465fbeedc68f553709248debc71f03dae300
RLBA-2024:0898
python-cryptography bug fix update
The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers.
Bug Fix(es):
* [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-cryptography.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers.
Bug Fix(es):
* [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873)
rocky-linux-8-x86-64-baseos-rpms
python3-cryptography-3.2.1-7.el8_9.x86_64.rpm
43ee033b549f4a2b862edd008cbf41374882c0cbabf5d4143f7a02b661bfcc83
RLSA-2024:1601
Moderate: curl security and bug fix update
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218)
* curl: more POST-after-PUT confusion (CVE-2023-28322)
* curl: cookie injection with none file (CVE-2023-38546)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libssh (curl sftp) not trying password auth (BZ#2240033)
* libssh: cap SFTP packet size sent (Rocky Linux-5485)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218)
* curl: more POST-after-PUT confusion (CVE-2023-28322)
* curl: cookie injection with none file (CVE-2023-38546)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libssh (curl sftp) not trying password auth (BZ#2240033)
* libssh: cap SFTP packet size sent (Rocky Linux-5485)
rocky-linux-8-x86-64-baseos-rpms
curl-7.61.1-33.el8_9.5.x86_64.rpm
c395c8f0f93726d40b0a7ddd835bd54477172d80b3d9217b59e19028d471c213
libcurl-7.61.1-33.el8_9.5.x86_64.rpm
c1d0f1fd52c2ebad2365531a42e91d79af21d34b173c41e0ca19827e072f2a6f
libcurl-devel-7.61.1-33.el8_9.5.x86_64.rpm
11131122c4f29bf3e9d143faae3efd008e2bd1f4d96993150bd1947af21b83e2
libcurl-minimal-7.61.1-33.el8_9.5.x86_64.rpm
151ab6c706d7aa8eaade81a63585ae421ac91f12d179a7891cd6935f6ea18a61
RLBA-2024:1604
NetworkManager bug fix update
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es):
* Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600)
* [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es):
* Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600)
* [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968)
rocky-linux-8-x86-64-baseos-rpms
NetworkManager-1.40.16-15.el8_9.x86_64.rpm
48da1b81cce6b3b83a482cfb8e6d7676a1bff7f7674b87631e9def6a7e30e073
NetworkManager-adsl-1.40.16-15.el8_9.x86_64.rpm
474a026ab535777c7264755efa9d776bc877d443d6ff3fcae81c487c12105885
NetworkManager-bluetooth-1.40.16-15.el8_9.x86_64.rpm
86d13c3405afe0f1610e384a47de5ce6055704395ce5e837d6dadcd9892bfb81
NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm
7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44
NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm
b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f
NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm
705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30
NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm
6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93
NetworkManager-libnm-1.40.16-15.el8_9.x86_64.rpm
3911b290a4f36569df75674b8a959d9771972ceba5c9e0d067c4af3305c462d2
NetworkManager-ovs-1.40.16-15.el8_9.x86_64.rpm
c79c415939f051f3bad78797a287a0531e131e8ebc1c166ca7abcf381c669965
NetworkManager-ppp-1.40.16-15.el8_9.x86_64.rpm
02bc73184d084a76dfaa8e7144f883e96067b501c9b09186a5231fb42047c483
NetworkManager-team-1.40.16-15.el8_9.x86_64.rpm
3f4960bf57e6c4264125b181b3f3a236431616f4e8f7c820ea34906c2c296f94
NetworkManager-tui-1.40.16-15.el8_9.x86_64.rpm
ee87c160b59aa7ac7c0bf3e3cc1a5850f2aa2c72a75a6d20b6521ad8fcf9659d
NetworkManager-wifi-1.40.16-15.el8_9.x86_64.rpm
93ecdf508147d0b081549133a71ed7f7a84240caa32ca3373a8dd8a13269ba4b
NetworkManager-wwan-1.40.16-15.el8_9.x86_64.rpm
ed422416d4b53e93ddf51a50af1ff3aef9271d3870e391aae0dd958845ab6fa5
RLBA-2024:1605
perl-HTTP-Tiny bug fix update
HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl.
Bug Fix(es):
* perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-HTTP-Tiny.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl.
Bug Fix(es):
* perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793)
rocky-linux-8-x86-64-baseos-rpms
perl-HTTP-Tiny-0.074-2.el8_9.1.noarch.rpm
2a2106eb7e08a0bfd8a6daf5770cd4616b46dc037a2e5f569fedfc8922c84596
RLBA-2024:1606
util-linux bug fix update
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es):
* lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es):
* lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562)
rocky-linux-8-x86-64-baseos-rpms
libblkid-2.32.1-44.el8_9.1.x86_64.rpm
75e36e64085e7ef1030f34cb77824e43c3980ff69d8a9447f4398a6d10a5f8c7
libblkid-devel-2.32.1-44.el8_9.1.x86_64.rpm
d3ea95e9094c9dad5f3c9e52a0a2eafac2d4cae03b2e3f145ba5ce6b1172e807
libfdisk-2.32.1-44.el8_9.1.x86_64.rpm
3f9cf40332bb1f3636e5aafe19c2adb4a920f31124a8aa2df186fdc81a5e1255
libfdisk-devel-2.32.1-44.el8_9.1.x86_64.rpm
95ace0357b40f2f91f631baed0c648a54738a19975473243f6fa826e496eec41
libmount-2.32.1-44.el8_9.1.x86_64.rpm
09e47337447004b28c4bdf8e96c72930128b30a1b730aa05c36c85852ff00c21
libsmartcols-2.32.1-44.el8_9.1.x86_64.rpm
4ac9720b77ceea7c95d65ef2756240b04d6bcff5dc26971b2cd51c15b2546310
libsmartcols-devel-2.32.1-44.el8_9.1.x86_64.rpm
7f2b1bfb7d548e86626c314aa75576a4db786d5783dded08cce474b0409b6901
libuuid-2.32.1-44.el8_9.1.x86_64.rpm
a1feb216c0b358b382ff1c3283741a82cf4c065a152058bf890118dc2ce103e8
libuuid-devel-2.32.1-44.el8_9.1.x86_64.rpm
18b0479bd96a5f7045b649f8e037a38fed5f96e619af9cc399540231c5382f71
util-linux-2.32.1-44.el8_9.1.x86_64.rpm
e9938cc50d0923e2add2a538494e9d7d6a7bc6f9c302d8705a50b74b1f8f8452
util-linux-user-2.32.1-44.el8_9.1.x86_64.rpm
b9aa2e15a4e2b81f04af9d7b9a2dd8a0f491a9e93830c9243a99a2f42dcfa37b
uuidd-2.32.1-44.el8_9.1.x86_64.rpm
6d301026ed318849fd0980838bf5e00f93c75d4c865eb4e7a74aac81fb176f09
RLSA-2024:1607
Important: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)
* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)
* kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527)
* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)
* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)
* kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631)
* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)
Bug Fix(es):
* OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394)
* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010)
* Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055)
* kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766)
* tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822)
* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077)
* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930)
* rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204)
* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479)
* ceph: several cap and snap fixes (JIRA:Rocky Linux-20909)
* [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063)
* unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719)
* [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101)
* kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954)
* backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139)
* kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331)
* ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496)
Enhancement(s):
* [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)
* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)
* kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527)
* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)
* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)
* kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631)
* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)
Bug Fix(es):
* OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394)
* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010)
* Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055)
* kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766)
* tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822)
* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077)
* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930)
* rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204)
* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479)
* ceph: several cap and snap fixes (JIRA:Rocky Linux-20909)
* [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063)
* unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719)
* [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101)
* kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954)
* backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139)
* kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331)
* ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496)
Enhancement(s):
* [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811)
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-513.24.1.el8_9.x86_64.rpm
d4c3aa2b5cb6771de2282f947915ff82aa641a1cf2478581a9f9bd8af7820ed9
kernel-4.18.0-513.24.1.el8_9.x86_64.rpm
02ccdba68d5aaf2cf21d222efe4dd271df62ff682b3de81f49f4b4ceafb63efa
kernel-abi-stablelists-4.18.0-513.24.1.el8_9.noarch.rpm
9dc4f48648f746ab7608ac9c020aaa0ba2c223bc5a53d56be0b1d2e25784e753
kernel-core-4.18.0-513.24.1.el8_9.x86_64.rpm
28241862f2cbc97ada16325e526c686a65cdcaa1ddac75e7cd4be45290b4f4d9
kernel-cross-headers-4.18.0-513.24.1.el8_9.x86_64.rpm
79c421cd229fc5728be38c237622e344cb4d4e690bd1ee2c425d190d8e7d8cdf
kernel-debug-4.18.0-513.24.1.el8_9.x86_64.rpm
02bab9449a913729101739764d3391c0bb56e6b16d2f623c4a8748c9ec1af9da
kernel-debug-core-4.18.0-513.24.1.el8_9.x86_64.rpm
b34a032e2b0dcb9c0e7b032bffe5bcf00a76aceb1727d6d7a0feacf4e43fba32
kernel-debug-devel-4.18.0-513.24.1.el8_9.x86_64.rpm
0d8fb2c1644b7e46c48198d6b59af7f9c1e70059ba264be9fe5086e397f9d23e
kernel-debuginfo-common-x86_64-4.18.0-513.24.1.el8_9.x86_64.rpm
ba19285eb7930dc197c012f368ab070c9b48295b5e7e19e4c47367cbde48c79e
kernel-debug-modules-4.18.0-513.24.1.el8_9.x86_64.rpm
cca2de059383f24b5bb7c0803b63aa0327e950598ca79f90d3cf4d9a7ef8f6b4
kernel-debug-modules-extra-4.18.0-513.24.1.el8_9.x86_64.rpm
f3b9cab2d7e6c9647e57d400e1ff6d01cffc5a5f5519809084dbcfd3435e1c22
kernel-devel-4.18.0-513.24.1.el8_9.x86_64.rpm
36a38a8fb290219442d34450e1e4b78d8b9819295f2d41d2fdf168c1adfcc15e
kernel-doc-4.18.0-513.24.1.el8_9.noarch.rpm
0def6c11404ddde26d393bca3efa0981d5813ee1745c7e4a2b15c86c98b86937
kernel-headers-4.18.0-513.24.1.el8_9.x86_64.rpm
9e6b11688073157daa2b14868002d890f4adc3d6afe11e95cf3ee22d128c611a
kernel-modules-4.18.0-513.24.1.el8_9.x86_64.rpm
d93967af2c3647e0839ab50f0780c97fb3686268eaeffd7dda92c77966a9c533
kernel-modules-extra-4.18.0-513.24.1.el8_9.x86_64.rpm
e33e30c9ed2c74979ba27686808a1b28d266971c15a56851c1777b447da305a1
kernel-tools-4.18.0-513.24.1.el8_9.x86_64.rpm
24f4146ec22f66c0885f93ab9b693b644f36ada46e900494f84a8c04fbaba23f
kernel-tools-libs-4.18.0-513.24.1.el8_9.x86_64.rpm
d737ad1b21a2c43c3f3cd1a9c08f5dc7cb7b0270b551e8834d906975bde5e7c0
perf-4.18.0-513.24.1.el8_9.x86_64.rpm
b851bf91fb2a6ab4a19a866ed1e8241a9ee6765b034450a2fbd4c271cbab9c90
python3-perf-4.18.0-513.24.1.el8_9.x86_64.rpm
fad3b87238e26daaef95060e4367aad5856760729b3c3664a61f61a436eaebc9
RLSA-2024:1608
Moderate: opencryptoki security update
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Security Fix(es):
* opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Security Fix(es):
* opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
opencryptoki-3.21.0-10.el8_9.x86_64.rpm
90cba074c678b9ea77314650012b8f9ffe11c0a3d895ac8e1c4fda4323d55c46
opencryptoki-icsftok-3.21.0-10.el8_9.x86_64.rpm
a72b241eabe73089ecc2e68b50919f5edec77a24824d2104ff1e471318f97a25
opencryptoki-libs-3.21.0-10.el8_9.x86_64.rpm
a1f9973f52e9c3ca03d6169408c96499c01eced26b4546efa1323f853c1b37b4
opencryptoki-swtok-3.21.0-10.el8_9.x86_64.rpm
559d3aaa09dae4d99fe6db8d8b022bed871d7802cb42a7a0e93cc7b93883012d
opencryptoki-tpmtok-3.21.0-10.el8_9.x86_64.rpm
f50f088d470ad128adabf15c4752d34236ac831947533fda3d2448e2c8fbad8c
RLBA-2024:1609
python-pip bug fix update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bug Fix(es):
* python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bug Fix(es):
* python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449)
rocky-linux-8-x86-64-baseos-rpms
platform-python-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm
5fc0d2372285ab4b67ce22df0e339dc53f7cf961a7d4304f870a4d03c7719a74
python3-pip-wheel-9.0.3-23.el8_9.1.rocky.0.noarch.rpm
c35cfde3728fbeb84e395247089088c87a9750091950213631435e86f86ec07d
RLSA-2024:1610
Moderate: less security update
The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.
Security Fix(es):
* less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for less.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.
Security Fix(es):
* less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
less-530-2.el8_9.x86_64.rpm
dfdb3e447001de813ae20024990c3a434f8f76e96ba8ea3f14a86f833318e66c
RLSA-2024:1615
Moderate: expat security update
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
expat-2.2.5-11.el8_9.1.x86_64.rpm
9cb51fd81d64f5ca0e846689f45e447d445d58091fec8558e044f71cd74c2401
expat-devel-2.2.5-11.el8_9.1.x86_64.rpm
50e800064f774d3973414ad9996012bfb7f2c4cf5df983a4cc5600db706628a4
RLBA-2024:1739
sos bugfix and enhancement update
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924)
* Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331)
* presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395)
* The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665)
* Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399)
* fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924)
* Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331)
* presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395)
* The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665)
* Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399)
* fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342)
rocky-linux-8-x86-64-baseos-rpms
sos-4.7.0-1.el8.noarch.rpm
021f3d73e9f1e3880d66db3b3e4d5ec3a86bf4895f050c942672c97b438dd2b4
sos-audit-4.7.0-1.el8.noarch.rpm
8e362a542e2317f6987396591278c1f33f9c987f0579b9392b0fd0c608e53796
RLSA-2024:1782
Important: bind and dhcp security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
* bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dhcp, bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
* bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bind-export-devel-9.11.36-11.el8_9.1.x86_64.rpm
c66537ce7400c499a576b548512e99ebcff413c50c2b9bbcff02e9cf2bfbb888
bind-export-libs-9.11.36-11.el8_9.1.x86_64.rpm
577947d4cfc79bb631bf1b0c4e9b085e83f0797709018bed189af646b21862a2
dhcp-client-4.3.6-49.el8_9.1.x86_64.rpm
79b3ca75904a2d842279b9abb00f22ebad11282548dcbfdb4c67fe24833270b3
dhcp-common-4.3.6-49.el8_9.1.noarch.rpm
1172e129dc346143f495e27267dca4e708fb70a055ae13dcdbaea140db37033e
dhcp-libs-4.3.6-49.el8_9.1.x86_64.rpm
9bf7c84811668f6f5bf6a646ef0346711e6b9993f3bbbba7f91fe68d6fcde0a7
dhcp-relay-4.3.6-49.el8_9.1.x86_64.rpm
13083bf2ac3225b434cee8b9c23f8cc9045b13c0e4a2e6143c928b31eca0fc34
dhcp-server-4.3.6-49.el8_9.1.x86_64.rpm
7d98cfb9fe6a31b87c11365adb200e2047f859f853c65aad6e579224c21cc25a
RLSA-2024:1784
Moderate: gnutls security update
The gnutls package provide the GNU Transport Layer Security (GnuTLS) library,
which implements cryptographic algorithms and protocols such as SSL, TLS, and
DTLS.
This package update fixes a timing side-channel in deterministic ECDSA.
Security Fix(es):
* gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls package provide the GNU Transport Layer Security (GnuTLS) library,
which implements cryptographic algorithms and protocols such as SSL, TLS, and
DTLS.
This package update fixes a timing side-channel in deterministic ECDSA.
Security Fix(es):
* gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
gnutls-3.6.16-8.el8_9.3.x86_64.rpm
38d3c886f42444a732d015f89b6809a26b08c176529ae5051d5c4d30c19e16de
RLSA-2024:2722
Important: glibc security update
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
glibc-common-2.28-236.el8_9.13.x86_64.rpm
0717831be3893442ee3433f30ce9af15789b20a91ddbad0cefa3f76707365d59
glibc-langpack-anp-2.28-236.el8_9.13.x86_64.rpm
1b26c21071910c0ffe237c9b557c7c21ac02ef03237aafb59ebd48bd21c972f9
glibc-2.28-236.el8_9.13.x86_64.rpm
b245492a8d830a9e2f8ee1a6d24333559bf80f885c511a7643749ce35045a1b0
glibc-all-langpacks-2.28-236.el8_9.13.x86_64.rpm
6b5d8154e5879cd6b72bb39ac155f01945e31ed0f24658077984c80569062691
glibc-devel-2.28-236.el8_9.13.x86_64.rpm
f12426894a073245c0e159747edd2e43c062b1402bc6871dc8bdf6efbb564b4c
glibc-doc-2.28-236.el8_9.13.noarch.rpm
ce65550a6e53d9dfdef6627470f4adec0fee717f2339624386ebee7c95e5e5aa
glibc-gconv-extra-2.28-236.el8_9.13.x86_64.rpm
4c71893e437e55c14020d6843a91cd33c0691c330fe9c7ce8991b839fd7b4137
glibc-headers-2.28-236.el8_9.13.x86_64.rpm
8169525314b2c212da60c3f10a7515debd883fef7e056070fbc6cc4ff63eaefc
glibc-langpack-aa-2.28-236.el8_9.13.x86_64.rpm
3061f2cf074623fce3ed32a77b57369f56c30f75d9eb164f80c46077fbf6df47
glibc-langpack-af-2.28-236.el8_9.13.x86_64.rpm
7b29629781ccf57fc0eaf1701c0e7545f962adc572dd249ae5f4c05151fb81b3
glibc-langpack-agr-2.28-236.el8_9.13.x86_64.rpm
b3542dc7b3adf6690b77dc10ebe4d3e83aa03f4aab762e41ec43d1c1fad91c10
glibc-langpack-ak-2.28-236.el8_9.13.x86_64.rpm
07d374354e18d97c2de26b7c9289c5a9e0bc990dce1c3b1a0e38c697b4738ff3
glibc-langpack-am-2.28-236.el8_9.13.x86_64.rpm
b042f0c6244d7694e04ae692b89dcc58125d3da480b8ff67f723d8ac979b951b
glibc-langpack-an-2.28-236.el8_9.13.x86_64.rpm
a336b41fd692bff0dbf8cf8b655873acc0fa892f66b25e17568dcb92afada0a8
glibc-langpack-ar-2.28-236.el8_9.13.x86_64.rpm
eb8e4636d30046a26297e105fbff0ab5065ff5da7b608a583059a3aa11970314
glibc-langpack-as-2.28-236.el8_9.13.x86_64.rpm
605fbdc6fd58a4f94e79fd04e7f2994d440ecc30d806714c9a6b2fc9d7e2c62f
glibc-langpack-ast-2.28-236.el8_9.13.x86_64.rpm
8825df8ee4f7ba032a50e2a0e3242a8919a8704735e3b35a5d810a187ce27d09
glibc-langpack-ayc-2.28-236.el8_9.13.x86_64.rpm
c42b64c4b7a794c09dea71d23a7b07e86f6fa64357d21e78a07e1090acb99508
glibc-langpack-az-2.28-236.el8_9.13.x86_64.rpm
affaa2fddaf10dff40b052b45ab016d1560da04f4baaf09f5f5ad275f67eab39
glibc-langpack-be-2.28-236.el8_9.13.x86_64.rpm
e31f217ca67be4474215e29d85d99b5299f0af0d6504719ba2a7324f76d49c90
glibc-langpack-bem-2.28-236.el8_9.13.x86_64.rpm
34d681b3d407e723179e4332c363d710614466dd6888c585894475bbea85faa4
glibc-langpack-ber-2.28-236.el8_9.13.x86_64.rpm
f7bc51fd26157073c19468afe832e1b629af4766f66a824a626e2ff8fff5d143
glibc-langpack-bg-2.28-236.el8_9.13.x86_64.rpm
042682116c694951a734fd38a7cad5e6f537559a516a8b89eb9278f985d2809c
glibc-langpack-bhb-2.28-236.el8_9.13.x86_64.rpm
2425bffda8178a163ec412bf41c110c53e950afa8656cd49a4ffac183ad71bbb
glibc-langpack-bho-2.28-236.el8_9.13.x86_64.rpm
87ed6e8f960a7a4083fbfd88110750e260456d39f4b7f2fe15ada2c52a244940
glibc-langpack-bi-2.28-236.el8_9.13.x86_64.rpm
9d24c6225201642a5a2799df87a961cb9befac2a76c857222fedb788bad5367a
glibc-langpack-bn-2.28-236.el8_9.13.x86_64.rpm
74411e3eb15346071a632cb857cd4b95d584f25d8d0329ff56febc86f3f1bb91
glibc-langpack-bo-2.28-236.el8_9.13.x86_64.rpm
303d1b0d7d93cd5a8d244e6e7d06fe5c5db5da547b6e346a919c0b9d3587d837
glibc-langpack-br-2.28-236.el8_9.13.x86_64.rpm
e36d9652ab90b84346db8627deeff645ec1f5bdec57ce3a762738984ad503f80
glibc-langpack-brx-2.28-236.el8_9.13.x86_64.rpm
726750ff34dadef4c8f0d2627b36c5807271032c3eb744574ae694d35b0ce8a6
glibc-langpack-bs-2.28-236.el8_9.13.x86_64.rpm
629d6c6953344e5609985ad2d1fb4f83fd3c154eeb472a2bf3b2e292681a8a52
glibc-langpack-byn-2.28-236.el8_9.13.x86_64.rpm
5d5d6ca78fb98eb6ba054d7ec825cae9ac9018278f2c1e8ac1d5367cd6fd9d3b
glibc-langpack-ca-2.28-236.el8_9.13.x86_64.rpm
5f51176badd28a076cd4c2233fc769e81991cebf8496b5338a3f5bdc2c8218d9
glibc-langpack-ce-2.28-236.el8_9.13.x86_64.rpm
e25c7e85188d172bf559db02bc68407b3ee8f8789226373e5dbdceb90f9607d8
glibc-langpack-chr-2.28-236.el8_9.13.x86_64.rpm
6a2189bd20900c651532c4d0b319937ba8ab64f9d9152dd5f48bf658ae18aae4
glibc-langpack-cmn-2.28-236.el8_9.13.x86_64.rpm
a90830fc9d0829cbe352464a8034aa3c573f0e6651abdb198e748aac63632773
glibc-langpack-crh-2.28-236.el8_9.13.x86_64.rpm
d6d71dcead3cd207e72412c7d2f9e54d01b5cb0d8257f4d9907caac15e3affd2
glibc-langpack-cs-2.28-236.el8_9.13.x86_64.rpm
660801246e80aca515d0da9fa5ec29cfe7633a12f2271418ca18fab1dcb3d40d
glibc-langpack-csb-2.28-236.el8_9.13.x86_64.rpm
2b77807cedd7e0d0a5644e370826fd4c2b25b4349a534494ce997a5dd4efd727
glibc-langpack-cv-2.28-236.el8_9.13.x86_64.rpm
231fddc7d10a7210d4314317fe2b2c3c1cca0e79dcca4066302ece745469e802
glibc-langpack-cy-2.28-236.el8_9.13.x86_64.rpm
302c950f955e745a68161e741df1cd919511f399f777fa71d8f9b87079fc9366
glibc-langpack-da-2.28-236.el8_9.13.x86_64.rpm
fdd5f9335ad2f85153ba525e53b55f77ece7fa9b1caafc74bc209715d852f7e6
glibc-langpack-de-2.28-236.el8_9.13.x86_64.rpm
4d927007de849378428b094330adb9fdf97b07249a0841a0ce4e43064168444e
glibc-langpack-doi-2.28-236.el8_9.13.x86_64.rpm
70a680e24c0f044837a1b8b488d3f8931d3672bd9d9abf8503a27604e98e210a
glibc-langpack-dsb-2.28-236.el8_9.13.x86_64.rpm
2804bbd43583ab74430738ed7a2d95041262ae456cea8fa148e16281db0bb74c
glibc-langpack-dv-2.28-236.el8_9.13.x86_64.rpm
f67b7386bea0521fd974d01ec9fa5a0fd578c0c055a1b072707a26a76b19c135
glibc-langpack-dz-2.28-236.el8_9.13.x86_64.rpm
ea4678e70c79b80bfd863448f0aef5ac63f1a195e81cf99535b618b5603ebc35
glibc-langpack-el-2.28-236.el8_9.13.x86_64.rpm
def2bfe81cd98e090314fe2622b6589f4b73dd46ac5d486345d858e6948ef155
glibc-langpack-en-2.28-236.el8_9.13.x86_64.rpm
5ab7cab35edc471322659ffffd2419202fe2bf49f1335170f2696676eb0bc5a4
glibc-langpack-eo-2.28-236.el8_9.13.x86_64.rpm
cebfcef26a0b5e4edcffd8104bb8be2a6509cd0b9fe42ff07da042c97234c1c0
glibc-langpack-es-2.28-236.el8_9.13.x86_64.rpm
4671e6cdfb9515f5de9bfca7e594fe2a1c17776080b09f688e83bf7e1a32c9d2
glibc-langpack-et-2.28-236.el8_9.13.x86_64.rpm
632807ab3092a421d87253cbe73aac53241bf58b10c0d1e4b2d6cfe29e2aa46f
glibc-langpack-eu-2.28-236.el8_9.13.x86_64.rpm
905eeceb999fd56190a9ec431db041935a54047f169408b748f8d7da0c253059
glibc-langpack-fa-2.28-236.el8_9.13.x86_64.rpm
e93832ccd520b69ca8da8adeee68479e6c505b0d3b6988a7cc13f9b876d0e592
glibc-langpack-ff-2.28-236.el8_9.13.x86_64.rpm
79d3020cff536877b09142498fbfe3ac59d23399269857cad868d8828efe228d
glibc-langpack-fi-2.28-236.el8_9.13.x86_64.rpm
2a2212d77daecc03457a32e00d4f1161834fc3d4d322d57311870bd2bb96c185
glibc-langpack-fil-2.28-236.el8_9.13.x86_64.rpm
72b73e8fd9fbc82c7863db9ccc4a8995866486ee83f107cefdaaf153a4c45774
glibc-langpack-fo-2.28-236.el8_9.13.x86_64.rpm
bab6a9c8d41de7455481a52ecb152c51238beded8ecf19d8d9742fbc109589cc
glibc-langpack-fr-2.28-236.el8_9.13.x86_64.rpm
ede31ce4bce93dfb756da12f3678f9f3ce8a7d871b29190b6fa1285b0bf5dd6d
glibc-langpack-fur-2.28-236.el8_9.13.x86_64.rpm
235b309b0ed095ce9b3762f51ab3cbd5717cc59b7cce8bdb8860e7a0bdcc1bb3
glibc-langpack-fy-2.28-236.el8_9.13.x86_64.rpm
47097d76f050e8e3fb9e333346116a8a7291256ff1c2c0081fc6a814037ae301
glibc-langpack-ga-2.28-236.el8_9.13.x86_64.rpm
970802e3ec703883d153b3f99a89164456659d7b512824844fd17f8d1d237026
glibc-langpack-gd-2.28-236.el8_9.13.x86_64.rpm
62868ca1e5ee82b61a9beb7baf38d6e8a836b9190eaf6686ea80831bd692317c
glibc-langpack-gez-2.28-236.el8_9.13.x86_64.rpm
763b936238ba0a18baa366a82ac10f14de88ed07b861c58924865995f88c58ef
glibc-langpack-gl-2.28-236.el8_9.13.x86_64.rpm
01bbeff77fa444939b1ebe60d444c2321fd15190d2fa83eba46ed828381749d4
glibc-langpack-gu-2.28-236.el8_9.13.x86_64.rpm
812b6ed682f6fc38c693859743341980044a289343bfe6c0a6f2a38f56e0fda8
glibc-langpack-gv-2.28-236.el8_9.13.x86_64.rpm
f9b18a274781bd4fc44bf1b9d671df85f0ebceade61932bc010224579cea0a5d
glibc-langpack-ha-2.28-236.el8_9.13.x86_64.rpm
5b2567ac8c80ec90fd2bb032d8cb750f76e8b9cc945997c7005ace0b58bfe39f
glibc-langpack-hak-2.28-236.el8_9.13.x86_64.rpm
4473b5cedac13e41e30b17e63750007696b2270b093330f2d1f1b379635f6239
glibc-langpack-he-2.28-236.el8_9.13.x86_64.rpm
a6ea3ba828150ed9e63eabcf3b9b5528e4d854ccef1e837e07555c0fb25a2fc5
glibc-langpack-hi-2.28-236.el8_9.13.x86_64.rpm
2f73f03f5c267d87944a50a90edbce706065f5dbd70d8ae2902c76758d2c438c
glibc-langpack-hif-2.28-236.el8_9.13.x86_64.rpm
9bdbfa7c56b33a30b196f067b790f1267dad85dbae666131066df62b70b256bd
glibc-langpack-hne-2.28-236.el8_9.13.x86_64.rpm
3c113a570628db80e08a56f07af2daa7c2acf2e3558cc6755f046f631c55ed14
glibc-langpack-hr-2.28-236.el8_9.13.x86_64.rpm
ba9503194d747e20609661d8b31a0d7ee2a621dbec6cb72c48e3d6a5173092a8
glibc-langpack-hsb-2.28-236.el8_9.13.x86_64.rpm
8060a9a6dcdd47f95b8be46d0f37637729b4eada0d1aeea6b3442d53b98bc6c8
glibc-langpack-ht-2.28-236.el8_9.13.x86_64.rpm
a2d8134cf64f33b3ef101019381108eab554f53d7fa42ecae20d6f8b0c2b2518
glibc-langpack-hu-2.28-236.el8_9.13.x86_64.rpm
d857986a3e051850b1b73bc2978774b678eaa4588d3c23ced0433a6e620a987c
glibc-langpack-hy-2.28-236.el8_9.13.x86_64.rpm
bffded529eca35060712443c52ca8dc38dcdd2bcfd9d47422b0969460dc53a09
glibc-langpack-ia-2.28-236.el8_9.13.x86_64.rpm
6a09fecc9f250bc6b1e5a7fda241e283fac934c322b518e2a353de837e7aa7a2
glibc-langpack-id-2.28-236.el8_9.13.x86_64.rpm
c39f5bc8e07616e8f08c2f3efcbe8172b42aadf4dd2e9bb583be4127f087181e
glibc-langpack-ig-2.28-236.el8_9.13.x86_64.rpm
0c6843536730adf98819d9a81818de6fd2dfee7ab58fe3324133f52aa7b5a192
glibc-langpack-ik-2.28-236.el8_9.13.x86_64.rpm
06cfb73b562de6e536e34432b0a2c017c06448280bac3b5f8e28aa76972e09a0
glibc-langpack-is-2.28-236.el8_9.13.x86_64.rpm
5e8bda3b8dd916d2579eb476c66aa66df9ad978a19081bedbd9394e8db712835
glibc-langpack-it-2.28-236.el8_9.13.x86_64.rpm
092e6cdca651a790d7c6e67b13e40c9ba987b39ae38e6eae14a7825c93bbbd5c
glibc-langpack-iu-2.28-236.el8_9.13.x86_64.rpm
3146c25cedce5442392e7062be9a720efd830d5afc8865b1ee12a85405071627
glibc-langpack-ja-2.28-236.el8_9.13.x86_64.rpm
20133066711b33c324b2c462dc50124484dec2be3facf978de1dae136a159f11
glibc-langpack-ka-2.28-236.el8_9.13.x86_64.rpm
922e8c9ebe8ec58ec3ce3d8807d9ff2fad87ebd64c55bc428b0c702d0fc1092a
glibc-langpack-kab-2.28-236.el8_9.13.x86_64.rpm
d7ce564f426df7f397ec2bf076675da130f3cc8a4cef9c978d3a542cc1dd51c4
glibc-langpack-kk-2.28-236.el8_9.13.x86_64.rpm
c7d64d86d962ed793fe464c44a8a3e3f98c35f93b7fbc977bb713081c42c10c0
glibc-langpack-kl-2.28-236.el8_9.13.x86_64.rpm
af2049d54061eb124e18b6a4214cdb3eaf993052bb77ff20aece46d30b1fa9b3
glibc-langpack-km-2.28-236.el8_9.13.x86_64.rpm
8f03bd1cbd1a7b1f9edc65f3f5ddca7654f127c2eff46237d1a2b437c24fb8bf
glibc-langpack-kn-2.28-236.el8_9.13.x86_64.rpm
02114135d2eb946bc642c02a640c4901b803d08c8261db8c8deb33433013be7e
glibc-langpack-ko-2.28-236.el8_9.13.x86_64.rpm
36505c88f532e91c4ce49923b9ab1c1f2f904849a1a90e3afa194d24346fdc32
glibc-langpack-kok-2.28-236.el8_9.13.x86_64.rpm
9ff846f8f5a0a4388be3202775cbafa02797da77aa5c098b4bd2ccba6de20295
glibc-langpack-ks-2.28-236.el8_9.13.x86_64.rpm
6b7c9b63f2d8fd7bc5dada8eced13e0d6afc238dc9e2b63d2c2047cdd9d86f83
glibc-langpack-ku-2.28-236.el8_9.13.x86_64.rpm
37bd6537a5fde7f8edf94ce6389a249c9cb36d296cdc5271d3b50c4b73b4d448
glibc-langpack-kw-2.28-236.el8_9.13.x86_64.rpm
8a7fe4175ca0eb2bed91fb156e5122b7300f5bccb2ea474f16587ec95273c7ea
glibc-langpack-ky-2.28-236.el8_9.13.x86_64.rpm
d854cad27a22b3d15c2d875612ace7ccfd54d3d684b083d6673a3917b3d60de5
glibc-langpack-lb-2.28-236.el8_9.13.x86_64.rpm
31528fa50063ccd429f832edbba60e2f1904c8a72564bfc72964c177651226be
glibc-langpack-lg-2.28-236.el8_9.13.x86_64.rpm
28462e92b552c88224a04541a182490a692288253dcb0ec6eddfc77448338527
glibc-langpack-li-2.28-236.el8_9.13.x86_64.rpm
7b54eb4c035417fefa528c675d30e3b89bc9fb46e9e978073a97787b8ecde715
glibc-langpack-lij-2.28-236.el8_9.13.x86_64.rpm
83194ee2041411219ad57bb618ce5363510db18ce9f03d8f978048ee6d275e9a
glibc-langpack-ln-2.28-236.el8_9.13.x86_64.rpm
62564bff52f80743e5464da68b788f853f94d4dcdc4b5ceb1b1766c5ec848a4c
glibc-langpack-lo-2.28-236.el8_9.13.x86_64.rpm
b76061944ed61d44e72a5a2b73f773f8ab0d4c1cab16330017e418495a489825
glibc-langpack-lt-2.28-236.el8_9.13.x86_64.rpm
0891358ed038492f916c391745c01f52d9840e2a436c06ba92b9cfda4bd29e1c
glibc-langpack-lv-2.28-236.el8_9.13.x86_64.rpm
ff6b1dc7497b4e63044ee643a8d513fdb166734102ddbc0c7f9f1a3353553be3
glibc-langpack-lzh-2.28-236.el8_9.13.x86_64.rpm
2ff0c287f82bb63fa05cf9ed2953f5b76b6967e5236c405d9972174a68962d64
glibc-langpack-mag-2.28-236.el8_9.13.x86_64.rpm
bb6048af20dfecc54ffd521ec9978cb7d64eb7815d32cdef4e839899e7024430
glibc-langpack-mai-2.28-236.el8_9.13.x86_64.rpm
040eadc84f69ad5f1f370b1b7cd55cf74b323ed544a93b26528606f3224db7ff
glibc-langpack-mfe-2.28-236.el8_9.13.x86_64.rpm
6662b756c90a6141031068ce8e55636cec1b51fa73fe2ec67868b56be6eb2020
glibc-langpack-mg-2.28-236.el8_9.13.x86_64.rpm
ce07f4d5563120a7d602b738e3ad12420de65ae7a6af05bcfcef2fae18ef9fa5
glibc-langpack-mhr-2.28-236.el8_9.13.x86_64.rpm
ccce85db48c55a5621e6bc5d93e1f9997f1960b531fd8fe700684238b8488e48
glibc-langpack-mi-2.28-236.el8_9.13.x86_64.rpm
6fa9b7507de6b6fcc8e45b3a6d88850e82c2df15494dd1b4b2816fab852a5362
glibc-langpack-miq-2.28-236.el8_9.13.x86_64.rpm
bb98aa37c28a68192b7452bbe1ee69c2f7b7e5167da9b9c735cee522bd8c2873
glibc-langpack-mjw-2.28-236.el8_9.13.x86_64.rpm
9adb4d57e1e8b2429f5edf89e665759aa49c979fa7bbe131b2e0dcb023cf7fdf
glibc-langpack-mk-2.28-236.el8_9.13.x86_64.rpm
74d2341a6363e8aede6a6bea500b1b06379a761490ff40709be35d987a249afa
glibc-langpack-ml-2.28-236.el8_9.13.x86_64.rpm
b4d7645dfd98e329283c7b75c36ed0a09292ca2bf938f6c9f26fa35fcf2710c9
glibc-langpack-mn-2.28-236.el8_9.13.x86_64.rpm
c1d64fbb61e5f644763f40360e552c04a91e23cd9b30edc3e000b2ca75939f67
glibc-langpack-mni-2.28-236.el8_9.13.x86_64.rpm
aa6bf16aa7a414cabfb6647b47c1ed3dd9c6ce3751f3f99288346d92bbf8afe7
glibc-langpack-mr-2.28-236.el8_9.13.x86_64.rpm
c65c09fdf7516240079052ea11028ce0a0f8bddea328766d71c383a1bf419a28
glibc-langpack-ms-2.28-236.el8_9.13.x86_64.rpm
5fed3d39f68a1bc6b5727ab89d38f29c08b813da71b0f8f81cc1221a686aa4de
glibc-langpack-mt-2.28-236.el8_9.13.x86_64.rpm
4d5a83d6fa6f915980e4277abea7df136e08d405a3de20f4aa3b83e42b855faa
glibc-langpack-my-2.28-236.el8_9.13.x86_64.rpm
82f1daad723ce02745414096be10c157bb6c0d766e0655c5fea0b1690e77c628
glibc-langpack-nan-2.28-236.el8_9.13.x86_64.rpm
d514fd60445f66291115e5686f1a0abe7df109e97cc4b83fa5e1e6d0d8025920
glibc-langpack-nb-2.28-236.el8_9.13.x86_64.rpm
9d9514a59e5e8dec6b7d05daaff39325584c477db04cadada23613e6acd01592
glibc-langpack-nds-2.28-236.el8_9.13.x86_64.rpm
59ef4c3b500711238b84e1f4ec2ff58a3cdf773d14ace3579245e0d2f8faf8b1
glibc-langpack-ne-2.28-236.el8_9.13.x86_64.rpm
e6f432c57e64ca82ab46ebe1d4348ca62de1184bf9208c5f621dc786497003d2
glibc-langpack-nhn-2.28-236.el8_9.13.x86_64.rpm
96d1c902ed6fbd509d3fc3b76ed4db6bec659b2591347a341eb62652599e81f9
glibc-langpack-niu-2.28-236.el8_9.13.x86_64.rpm
e392882214641e7feca970a1d79984c2ab1f9764f6203e584ac23e88234b54be
glibc-langpack-nl-2.28-236.el8_9.13.x86_64.rpm
6b430f0bf24ab9d23a35dd6dd7e7c9bee80dbfe8ff5893ad9079ac6975919715
glibc-langpack-nn-2.28-236.el8_9.13.x86_64.rpm
b62719dff997216d93e335902d8e1c1c7d4d59a1ec76c62282d7580fde876780
glibc-langpack-nr-2.28-236.el8_9.13.x86_64.rpm
8d08154d995e18260fe5c7921caf923eb3d31da1f6232dd1901ea376bdb200e8
glibc-langpack-nso-2.28-236.el8_9.13.x86_64.rpm
8a2d37c674a164349cf26adc592567938571f1b6a58df62e8b2e0988d8145dd3
glibc-langpack-oc-2.28-236.el8_9.13.x86_64.rpm
7b6d420666ecbf9aa6ab6de34da1ae40ae0b740043c9e0b0b0301392318be0dd
glibc-langpack-om-2.28-236.el8_9.13.x86_64.rpm
e2ae157221cf4b2ece1fced16b040677b130a04361ef2134200b9a5520ecbae8
glibc-langpack-or-2.28-236.el8_9.13.x86_64.rpm
445cf2c678918e691279c83df9a384af79adcf228850b13d3997338274847a1c
glibc-langpack-os-2.28-236.el8_9.13.x86_64.rpm
4c71a50d824111483b202ebb0d42ee2c8c3dbeb549c7ec10daf0bef56eef025a
glibc-langpack-pa-2.28-236.el8_9.13.x86_64.rpm
a6e344b48b774a44cbfd29fb5318dd947cd5260d80295a393f59afce3299f66f
glibc-langpack-pap-2.28-236.el8_9.13.x86_64.rpm
3416997ff8dbc523e26ff89434b82316cd7521a595ec6790071f6ad2335fc0c6
glibc-langpack-pl-2.28-236.el8_9.13.x86_64.rpm
aea9c8750c8ef9cdc5dad501ee73ba63cd4357073296cc8fd9a9bbcb598e18ae
glibc-langpack-ps-2.28-236.el8_9.13.x86_64.rpm
be4d60e3aef5b89ec5c563eb5bdffeaf76a456eda8803944335ca5ad692b6324
glibc-langpack-pt-2.28-236.el8_9.13.x86_64.rpm
1c7e49b6f971786dcce5113e85cedb7febb6b42ae4cfb34cc0cbd0f41e3bbe77
glibc-langpack-quz-2.28-236.el8_9.13.x86_64.rpm
c0271122a788d78a293f287daf4478fb56014c225ba84437f67a6f3eee494785
glibc-langpack-raj-2.28-236.el8_9.13.x86_64.rpm
379e7b1006e601d8722ea7f231b8df86e7c48974e9506de57ce98c8e28630ccb
glibc-langpack-ro-2.28-236.el8_9.13.x86_64.rpm
3f3c08c589f89387d6342d96d8d09388ecde4271a8d59969b7866cadb6546499
glibc-langpack-ru-2.28-236.el8_9.13.x86_64.rpm
c52954ea432e61e103a16393d3814a50d40d46f1281bc1f0b4746a8ec793c637
glibc-langpack-rw-2.28-236.el8_9.13.x86_64.rpm
da5d3cbc1e3fb76c42c6839c86a6f9d5507ffb6fbd3cba2acd3b2a3e8da23627
glibc-langpack-sa-2.28-236.el8_9.13.x86_64.rpm
25bba3d36f660bc9bc8bf2197add8192c393d82b9af3abe8bd893cc12bdcb58e
glibc-langpack-sah-2.28-236.el8_9.13.x86_64.rpm
996ec994d8d8acbcaff860b83fdc2ef407af94ddccba7e6569a7e79db49bf250
glibc-langpack-sat-2.28-236.el8_9.13.x86_64.rpm
83302a490282225ae6b0b95b725e20e8f92e9de339a14e6c58985f9e4804ba18
glibc-langpack-sc-2.28-236.el8_9.13.x86_64.rpm
eeb841ceb91290ad04f04b85f1292ac3b6a0dbdb032aabf65d6e72371148a5b5
glibc-langpack-sd-2.28-236.el8_9.13.x86_64.rpm
1543ddca865ce626ac04c87b0d357614072fb72f08775daa04591a3c59b8a67d
glibc-langpack-se-2.28-236.el8_9.13.x86_64.rpm
1cf9f4af244dbf66f21e28b3bb208b09581708583e9c312a72ce50aeee571714
glibc-langpack-sgs-2.28-236.el8_9.13.x86_64.rpm
e245a57d09fbeb8e47e0556464c4bc571cea558269faa4d65d666cf3ac469f6f
glibc-langpack-shn-2.28-236.el8_9.13.x86_64.rpm
86d3ea6aa840d554097c928d773c71c89cc7014dc9d6f05d9fb3f53b4a28e881
glibc-langpack-shs-2.28-236.el8_9.13.x86_64.rpm
fd75b8cb8e3cb5d2c627254a23ce68d231da45f8fed01eaf1052b33edf88b7c4
glibc-langpack-si-2.28-236.el8_9.13.x86_64.rpm
0261a15ba0c7d7c67b7c46f3b971f5587be35a0b60c7cff36fdcc175f257df38
glibc-langpack-sid-2.28-236.el8_9.13.x86_64.rpm
d2f239225178bcbdfb8fa5e7d56221e3b382f853caa115ad07532a4a1b9f2401
glibc-langpack-sk-2.28-236.el8_9.13.x86_64.rpm
617decd78d2c674b0fe5eac8641f97fe41f1a97d334e519fda1f0df05187db0f
glibc-langpack-sl-2.28-236.el8_9.13.x86_64.rpm
917687a15d5a93408d08232da1388712cc32ca74b1d63e59b83b95471f86d3e4
glibc-langpack-sm-2.28-236.el8_9.13.x86_64.rpm
ae920408c496f721f10713bdafe79145644a303335e63634ddb6c5ce3957f165
glibc-langpack-so-2.28-236.el8_9.13.x86_64.rpm
c915b576495d9a0cb360c6c842972b92888cf38943e6aa7ae234f5be60f92b33
glibc-langpack-sq-2.28-236.el8_9.13.x86_64.rpm
b22b2be0e81b207281e30a4f6615c8eb410594b4ee6a745873ac730dac2e9895
glibc-langpack-sr-2.28-236.el8_9.13.x86_64.rpm
366746c852cba45f2668c899fc7d8ea7302e50f021110dc2ef860248c04934da
glibc-langpack-ss-2.28-236.el8_9.13.x86_64.rpm
f65f816b46c9a184abf9386131494f924735d5b6fd0221dcf3f47ed12cc10abe
glibc-langpack-st-2.28-236.el8_9.13.x86_64.rpm
5e5ec253aa258ea0d6e2de35378250156e413273ad07baab886734ca2b0530a8
glibc-langpack-sv-2.28-236.el8_9.13.x86_64.rpm
3965b20dce86abc5c2705ed7453afb6180eea80869979406e8cbb769e93dd1ae
glibc-langpack-sw-2.28-236.el8_9.13.x86_64.rpm
8a2333168b8bbcb8b766804b01e5121450418f4da4325d2e6bb9f01b7832d291
glibc-langpack-szl-2.28-236.el8_9.13.x86_64.rpm
026ff0ad625dee5bb1c125f4deac588d392e503c5bc869685bd79d4614eefd7e
glibc-langpack-ta-2.28-236.el8_9.13.x86_64.rpm
030caaae9959f73e83fc256ac480834d88b42cc8932c7ce88c63487fc5289c24
glibc-langpack-tcy-2.28-236.el8_9.13.x86_64.rpm
c9e27adc9557e316d4e03af5abcfa8655d4c5f07dc51279a2ce74e8645e09f62
glibc-langpack-te-2.28-236.el8_9.13.x86_64.rpm
9b0031e8d620a38e97f4b78f9287d204d381d267052a84dd41ae978bff3364cb
glibc-langpack-tg-2.28-236.el8_9.13.x86_64.rpm
10515e760b09d187d7c626f7527e829e8689dc2697a894ad6e2058e967d3683a
glibc-langpack-th-2.28-236.el8_9.13.x86_64.rpm
03bf3205b4237300d4c3e3d15abc90f37810c010fcf67332fb14430d0047959f
glibc-langpack-the-2.28-236.el8_9.13.x86_64.rpm
137a03ef7ec0a88c47aa7b6f76acf30632fc927156f052df9a9a0691c2bab382
glibc-langpack-ti-2.28-236.el8_9.13.x86_64.rpm
cdf67071ce7ab36b4144b57caa746776a2d13237aaf89d1f951621b65606b6d5
glibc-langpack-tig-2.28-236.el8_9.13.x86_64.rpm
546b0774b05ce1802af9856f5d8fcee8f8d519defddc3bf72ff80f0edcdeb593
glibc-langpack-tk-2.28-236.el8_9.13.x86_64.rpm
f7cf59dece07e630fa5a09e0572d1570c1281aaf3f4f3090bcc67ff92e1ea908
glibc-langpack-tl-2.28-236.el8_9.13.x86_64.rpm
7e10ca3c0d982f46366f3a7b918b886eea6472b7674874f5ab8afc8b64aec49e
glibc-langpack-tn-2.28-236.el8_9.13.x86_64.rpm
08b13b9353f3fdeac8f8ae4d816e8f21b4a48c0de3b9a3c91847c87d2234294d
glibc-langpack-to-2.28-236.el8_9.13.x86_64.rpm
57add976b7d582430e61ad43c2114f03c98918c9f1db65afb896d2a127f03031
glibc-langpack-tpi-2.28-236.el8_9.13.x86_64.rpm
c70380eda8845e327a7c66a8e718873ccda2dc08af6433c03e902f43ed1e9ed8
glibc-langpack-tr-2.28-236.el8_9.13.x86_64.rpm
72e2f88d516349872c28234bc087ea025018579b2e6762fdfd12d10b452e6ad9
glibc-langpack-ts-2.28-236.el8_9.13.x86_64.rpm
d6c316469c3267d15c645de00b3b3cacbd892071ca27d92050820b44834a1363
glibc-langpack-tt-2.28-236.el8_9.13.x86_64.rpm
43a44beb877e6f6082f7818df022b08c74c36a2d7ca5300161253448e199c72e
glibc-langpack-ug-2.28-236.el8_9.13.x86_64.rpm
373a6723e7f4db02bb76cae83df78edb9d846982137e33b06d479ec026c1ef89
glibc-langpack-uk-2.28-236.el8_9.13.x86_64.rpm
f8ad07a5d975150f27fe2ac72ba4d1eed7ce2abe19d5018a73dd182652e035de
glibc-langpack-unm-2.28-236.el8_9.13.x86_64.rpm
e5a2fd459269035512c63652210a39584f9779c178b24cf32ecde0653b362fe6
glibc-langpack-ur-2.28-236.el8_9.13.x86_64.rpm
99f91e0bffde017fe5c58f48d380cafde42e403136414dacb7c67c6c2b37f232
glibc-langpack-uz-2.28-236.el8_9.13.x86_64.rpm
75088e9f35c584871b9c0be0768c3d75d467873112aee3dcaca8bd5b8d6aec4b
glibc-langpack-ve-2.28-236.el8_9.13.x86_64.rpm
f3a18793bcbf94fcb3d2f15ea47b928c07676081e9a49043ce8105fa704d388b
glibc-langpack-vi-2.28-236.el8_9.13.x86_64.rpm
df75d81a96dc79200e7742cf7e4c01c7dc29b8f3401cb8b0c343e6d3f19b7fcb
glibc-langpack-wa-2.28-236.el8_9.13.x86_64.rpm
8fbc9ccf973660158c0edc8ef6cfe330204f1fe4f3310c9da0684d012fedb862
glibc-langpack-wae-2.28-236.el8_9.13.x86_64.rpm
958966a7fd749058e2a54b46ca2e978dd220ece5d04742d75c61a41abdf16017
glibc-langpack-wal-2.28-236.el8_9.13.x86_64.rpm
49017c18b0dd4845dd08cfaa5cfca378a48fc39dcde885ca23f545f0702f74c8
glibc-langpack-wo-2.28-236.el8_9.13.x86_64.rpm
d467deda914184ce458d6d001043c65c5d56d775b390fd191e3654f2e67b1e8c
glibc-langpack-xh-2.28-236.el8_9.13.x86_64.rpm
d21f8c44d898d1df8d32ab52e58cadb09d6d6c760e642fe8071b26c5ccbb3e1f
glibc-langpack-yi-2.28-236.el8_9.13.x86_64.rpm
eee54a5be79eaa45387e9a662ecde6779a325afa4638b7499e568fc2db6979a3
glibc-langpack-yo-2.28-236.el8_9.13.x86_64.rpm
93cf46095cfe009ae5b3c878e46476580c22ecf938d69500da954c491c2b423d
glibc-langpack-yue-2.28-236.el8_9.13.x86_64.rpm
63f545f6cfe69e220d86c3ab826155776a31b4c87794b85b5e44fe686fdc4fde
glibc-langpack-yuw-2.28-236.el8_9.13.x86_64.rpm
057d990fb47c81641901028fd3d6382241ff1bd80e6a2758817b6e82c5513b43
glibc-langpack-zh-2.28-236.el8_9.13.x86_64.rpm
8bb2a8472e28f2a54e166b48f4bc6df4b84b6cde3d7a9068ea47dccc22e58d03
glibc-langpack-zu-2.28-236.el8_9.13.x86_64.rpm
d64b62299ece755a66d8e35382457c1ce96a946aa96be271ba49723c34dafcec
glibc-locale-source-2.28-236.el8_9.13.x86_64.rpm
02e80032c741cb712301b811717c60a505277162144adacfea082c6d4cdc3e86
glibc-minimal-langpack-2.28-236.el8_9.13.x86_64.rpm
f022542ecba747dcf3bb77eb1be7fcb10de98fa53f0e3cd0eee26cbc4cbc0b69
libnsl-2.28-236.el8_9.13.x86_64.rpm
a1cfaeeea4bd49bfa7011f951cfce157046d1e17da4adfb0bdc144a89fed8051
nscd-2.28-236.el8_9.13.x86_64.rpm
a3849b50e239b101f7b58f38c81689534eb89694c12ab1e4cbb8843a9560542b
nss_db-2.28-236.el8_9.13.x86_64.rpm
a9295073b1fbfa55b4a8c976a82f28bdc13a4717990dd112ff612aaf9da82ac1
RLBA-2019:3778
hwdata bug fix update
Bug Fix(es):
* Pull PCI/USB IDs for 8.1.0.z (BZ#1767717)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* Pull PCI/USB IDs for 8.1.0.z (BZ#1767717)
rocky-linux-8-x86-64-baseos-rpms
hwdata-0.314-8.22.el8.noarch.rpm
08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69
RLBA-2024:1602
nftables bug fix update
nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables.
Bug Fix(es):
* nftables counter (JIRA:Rocky Linux-2596)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables.
Bug Fix(es):
* nftables counter (JIRA:Rocky Linux-2596)
rocky-linux-8-x86-64-baseos-rpms
nftables-1.0.4-4.el8.x86_64.rpm
5d6d61c1319ab8464e5f2f739cf1d06aa777cef25147fec64e6359ffd63de913
python3-nftables-1.0.4-4.el8.x86_64.rpm
617132927c4ef0244f34fce882a95fc89ec14cf6195354d0de7570840aed4d45
RLBA-2024:1603
iptables bug fix update
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es):
* ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350)
* New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es):
* ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350)
* New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654)
rocky-linux-8-x86-64-baseos-rpms
iptables-1.8.5-11.el8.x86_64.rpm
fdb50c8f3f5e6e412de4aad0bd0ad80cc83b16eba7564539438e844379140553
iptables-arptables-1.8.5-11.el8.x86_64.rpm
7350d4e1036f858de69fe807e431a924b7120e0cf0f91a3903d6b516bb61af11
iptables-devel-1.8.5-11.el8.x86_64.rpm
165c169cf0e3f53f2935cbdba2d091d5440eed47c9493148d692b8af49bbf230
iptables-ebtables-1.8.5-11.el8.x86_64.rpm
843755dcce2d76edfb1ecac2ee18e50c523f2de9e4f2723d0925975d001e37d8
iptables-libs-1.8.5-11.el8.x86_64.rpm
a377b20131a9a962d4832390c54c5e4901d71fd9dbc5a87c4c94129cbd95d1c7
iptables-services-1.8.5-11.el8.x86_64.rpm
cbff9551af131bdcdc16f37f374478ad42d8f98ad44fce4ae85d7bdec1260213
iptables-utils-1.8.5-11.el8.x86_64.rpm
f4e3710af660e958a79c2f473a439409889170f9e237bff79cbf6f477f595a70
RLBA-2024:3136
libsoup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libsoup-2.62.3-5.el8.x86_64.rpm
886459733d2e4eb826c7d88be8ae35d83980d45fa3b6031d105797e83f5e8308
RLBA-2024:3142
numactl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numactl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
numactl-2.0.16-4.el8.x86_64.rpm
cd75e2e9d59e1d464b40ae6c3ab9cf6cd159231dbecb6efede7ae4db62480a4a
numactl-devel-2.0.16-4.el8.x86_64.rpm
445a1887b9c4ac80bd8bb654d32c266e3809767e862e6450124f5010d03b16c5
numactl-libs-2.0.16-4.el8.x86_64.rpm
08d156324fa101363d0559c9558d3df70e25b7033170ada0c5bfca9608a94fd6
RLBA-2024:3140
kexec-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
kexec-tools-2.0.26-14.el8.x86_64.rpm
22188ccf09e91ff1f5d96c67a44054b252b6878718411cc4324bd11cae265dfb
RLBA-2024:3141
c-ares bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
c-ares-1.13.0-10.el8.x86_64.rpm
445b151877a4d8cfc25b3207b207be15cddb452cf3c6964526e275a018dbc12b
c-ares-devel-1.13.0-10.el8.x86_64.rpm
80b2752fd37e51a07f19b6c39584236cead5fbd7e07f71033f9828020f9f6deb
RLBA-2024:3137
libtracefs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtracefs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtracefs-1.3.1-3.el8.x86_64.rpm
c9a3f81883dc8f92eb930fa35cd71f6186ff4ea6d88b0912aa6e099d60373a94
RLSA-2024:3139
Moderate: squashfs-tools security update
SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems.
Security Fix(es):
* squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153)
* squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for squashfs-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems.
Security Fix(es):
* squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153)
* squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
squashfs-tools-4.3-21.el8.x86_64.rpm
590e7d25b06d6838f680a9381911f859ff36104da9c522179a169f6528f03b94
RLSA-2024:3138
Moderate: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.el8_10.x86_64.rpm
1c31c30d1f10e9c122cd45a4d07f5e80d5abd372ad7c5116fe9ef1cf0aaa9730
kernel-4.18.0-553.el8_10.x86_64.rpm
67e494f803fffb643c81cbfadcdc6978065c16d81e72b22206e0a8f8baaf4456
kernel-abi-stablelists-4.18.0-553.el8_10.noarch.rpm
4a654bf1f356dc3c1db0c813b00868d3d3f3dc5633e85ffe6507aec53c3652a8
kernel-core-4.18.0-553.el8_10.x86_64.rpm
b8c3e03882cc219c69392acd3badd8df5f0cef327f539f06ddebfe01d41a1fc6
kernel-cross-headers-4.18.0-553.el8_10.x86_64.rpm
4a8162648a73f870905191360f7b75ebe4bb0bf7ba15ce1d4b677410fb8be44a
kernel-debug-4.18.0-553.el8_10.x86_64.rpm
ebb8dcd1a61691e2f5688035d3776076f4faaf5705f8ecea2b88eaf5d31d006f
kernel-debug-core-4.18.0-553.el8_10.x86_64.rpm
a912a135204d7214b67ef3ff3f6c26a4c8a325547c2ddebf7d2290725cf5cc71
kernel-debug-devel-4.18.0-553.el8_10.x86_64.rpm
8be7e9c7cc1f3ebec82d2a4b4b02c0b508a6bfd430e83aa4f898d33e93c8b53c
kernel-debuginfo-common-x86_64-4.18.0-553.el8_10.x86_64.rpm
25a70156deeb2f58d48ff2215e0baa5f9738a686e48be5172a7f54684d539a50
kernel-debug-modules-4.18.0-553.el8_10.x86_64.rpm
01405d5c347819ede6142a0bc3cf966fc41d5b816f6e2e31ecdbe0ef45999a27
kernel-debug-modules-extra-4.18.0-553.el8_10.x86_64.rpm
1ec0b3630abff7bd7649aeec81ae11dfa741e2c070b7d82e7052f90b19f77d3c
kernel-devel-4.18.0-553.el8_10.x86_64.rpm
269c046c07549943137d6a6d6316a0f217eb7d2c229e8a32972a915a50060e6c
kernel-doc-4.18.0-553.el8_10.noarch.rpm
2b50aa89af6bc25639ebd05ec71ac66e0bc9f5b550f8173e4dbdf278084d8292
kernel-headers-4.18.0-553.el8_10.x86_64.rpm
63c006d4afd10c77e0505b01bbef7cd1aa7f4250dac9abc84edc4c7ba71445f0
kernel-modules-4.18.0-553.el8_10.x86_64.rpm
1303a1948bfc61d71b1826f052feb1dc9cd3bdf9b1b5f24c8e5365ff9032f5be
kernel-modules-extra-4.18.0-553.el8_10.x86_64.rpm
dc20a5ce0d99514409ec5e28de30ad492032745e9765b9dc317353b0cb763fd8
kernel-tools-4.18.0-553.el8_10.x86_64.rpm
c5ad1795a8c00cd888e4119c52831892f931012c95424cc6e3af5a8e867d7fc2
kernel-tools-libs-4.18.0-553.el8_10.x86_64.rpm
2782734ac038af61d45a469895422c7982b8239cde56f3fa93ce253f7059a9bf
perf-4.18.0-553.el8_10.x86_64.rpm
67c3d582a6c873e5f8d889e4903176e4e0c708c502bc030ccf70b79f7c905c76
python3-perf-4.18.0-553.el8_10.x86_64.rpm
ea354037627efd887adb7bd8faad98dd0c445557026f1a2b573b11c4e4f71929
RLBA-2024:3152
glibc bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
glibc-2.28-251.el8_10.2.x86_64.rpm
5f9dee73acb40bc44f9e30c9798549fe58aa76aed614a844187b5075e4db4304
glibc-all-langpacks-2.28-251.el8_10.2.x86_64.rpm
2b7dfafee58b2672940b0e4ddaaf319f5797a06ed407a8c1f28e8420a065badb
glibc-common-2.28-251.el8_10.2.x86_64.rpm
51acbbeb9f97dbc9afeae0f8fe51f5e41c91ef33441a5a1d31410638c34fa657
glibc-devel-2.28-251.el8_10.2.x86_64.rpm
93c3eac9db417548298b90449dc69be3410136d8ccef59ffa996ad690ebd2b16
glibc-doc-2.28-251.el8_10.2.noarch.rpm
8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53
glibc-gconv-extra-2.28-251.el8_10.2.x86_64.rpm
890e73820ba5355f7d55020f63fe11d3dde628eaf4227dee344f2c3b6e857e5a
glibc-headers-2.28-251.el8_10.2.x86_64.rpm
7d6743a8dbbea1181218ef247608124d77dee6cac82031bb7fe3ec4f5e04a28a
glibc-langpack-aa-2.28-251.el8_10.2.x86_64.rpm
678bc555973e19d3ea769af140a21f0a7576458dc02c48a3b64ed72da1dd7e32
glibc-langpack-af-2.28-251.el8_10.2.x86_64.rpm
00c1d27d1a5749eea68a51e0f67602496fa5f3f442b85f6a1a826a6c46f64807
glibc-langpack-agr-2.28-251.el8_10.2.x86_64.rpm
7d575d87e04d8f22de7daf7824efb5d1163d5f0fccaddd10975736df9b76d878
glibc-langpack-ak-2.28-251.el8_10.2.x86_64.rpm
731d5b965205efb67eb1e48b7e76b84202c88874e2cdad1d66f66a8fbc497a2e
glibc-langpack-am-2.28-251.el8_10.2.x86_64.rpm
358d6731c5b4dbd2764782afb3cd7ff56a6854d700e8d6a985c93f6732f73f66
glibc-langpack-an-2.28-251.el8_10.2.x86_64.rpm
69954eb1ffb5fe5db98e053287b3c013ea88948eb7da52c8d11675b849c919cf
glibc-langpack-anp-2.28-251.el8_10.2.x86_64.rpm
7e429c3e27157fa104f7186f9b103117d48dc325cff420f2a7a490eda09f9064
glibc-langpack-ar-2.28-251.el8_10.2.x86_64.rpm
4cdcd6389a4b7a0c102b44787846eba902740f90d1eb93b771045c2f76f36063
glibc-langpack-as-2.28-251.el8_10.2.x86_64.rpm
22dd94c0ad3bba6f082d1519c25af6e81494751e11c9699cdca083bc20a2ad51
glibc-langpack-ast-2.28-251.el8_10.2.x86_64.rpm
792a7394d99296b91ea7f57eca97c2677708022e25be9a7c449e7ed44ab98472
glibc-langpack-ayc-2.28-251.el8_10.2.x86_64.rpm
e5e2695a09b5ddd925caff590df6d514920c30e5ba0b513bc2ee549b0f8910ec
glibc-langpack-az-2.28-251.el8_10.2.x86_64.rpm
c8d7fb8b1c43ed290cdf420627db251fa9aaf10bf737676aadf7d76bb02ca7b0
glibc-langpack-be-2.28-251.el8_10.2.x86_64.rpm
82386a29f77623edb58f17e8e205eab173dd83d0efbdf10dcc724f18a142a46c
glibc-langpack-bem-2.28-251.el8_10.2.x86_64.rpm
03cf8e781a5715aa80dc6d7a124f83267baf70b47066f1a63b50c2792fe147be
glibc-langpack-ber-2.28-251.el8_10.2.x86_64.rpm
073287b7918809d1d3c68f8c973aba66f535c93e5d46ca183399d4f679b7a7df
glibc-langpack-bg-2.28-251.el8_10.2.x86_64.rpm
8635f78096f91103fe6ff0e76791477ae615fda3947b9cdec41d01b418fac802
glibc-langpack-bhb-2.28-251.el8_10.2.x86_64.rpm
2dfde722f24cd75029ffd26bba8223a330224849985ef2ec3318d6629793ad24
glibc-langpack-bho-2.28-251.el8_10.2.x86_64.rpm
d0be0055537fa1ac40d80b887a49323d8319669912589e6f4aa2b2d1f1f80823
glibc-langpack-bi-2.28-251.el8_10.2.x86_64.rpm
d7af1f7358f59daa54cb63c026d155d089af7002bff539e8338428a577910a50
glibc-langpack-bn-2.28-251.el8_10.2.x86_64.rpm
e71c0edab89074f318267dd37591fef8fa8d7d30236db5fc1642b8b591066ff2
glibc-langpack-bo-2.28-251.el8_10.2.x86_64.rpm
0c379783e6d387f8590f339d799288a8fb67b08d9493ae2616ebb3297b1fe8ac
glibc-langpack-br-2.28-251.el8_10.2.x86_64.rpm
31c0c28bd287ebbc4b5d4d1fbb1d302cd9a471161717efc6fc3b01a7664287d9
glibc-langpack-brx-2.28-251.el8_10.2.x86_64.rpm
c568de193c0807af757d835d91a988a89e44b3e04bef73a82073d5934727979e
glibc-langpack-bs-2.28-251.el8_10.2.x86_64.rpm
f543df498a7e63c8f8b55025aaa8b3b3aa0af098eeeb49fa151e899be622f5a0
glibc-langpack-byn-2.28-251.el8_10.2.x86_64.rpm
f8fce0af3e0eb179f7341420495a18749d2443c9e8c11aae500d1e5ed70224f4
glibc-langpack-ca-2.28-251.el8_10.2.x86_64.rpm
745ba708a40f5a93d603a60fb50fc194f4fcd115fb4df2df10b5b6a638293c58
glibc-langpack-ce-2.28-251.el8_10.2.x86_64.rpm
59aad0c3adbaca6433df9e570b0f3bf5206592abb8a2fdf006e4407f952563b6
glibc-langpack-chr-2.28-251.el8_10.2.x86_64.rpm
67201e83a0ade666dc3c35f8de0ac8a8b7cff06820533a7840b62a282f08f7f9
glibc-langpack-cmn-2.28-251.el8_10.2.x86_64.rpm
976dcbb8cb8c547ffa0eaaae09e5f6e126748900d29a46f9e34a4073fb7c19ab
glibc-langpack-crh-2.28-251.el8_10.2.x86_64.rpm
d41a8e229513b1648336206fdfcae7fa14b37aaa35157ddc21f6e2fb56c7e74b
glibc-langpack-cs-2.28-251.el8_10.2.x86_64.rpm
e0ad588a5059b295dc0b0db39289392b8c4b0bf989dc535f63cec515923795d0
glibc-langpack-csb-2.28-251.el8_10.2.x86_64.rpm
079c408e016d0af342385c701fa580640254847378955ae2b64b42eea579adbd
glibc-langpack-cv-2.28-251.el8_10.2.x86_64.rpm
6924b4bf9edfad8bb713820e79b5ae6b7d430fe33fc45970b7d7757e3279c108
glibc-langpack-cy-2.28-251.el8_10.2.x86_64.rpm
7ae8033e698f778a161eadf9ccfa3824667b8937aa6599320229288171d412cc
glibc-langpack-da-2.28-251.el8_10.2.x86_64.rpm
12fddd526e7c4b62bbb30080fd2717d33e2a8039d44618a652f7623db4b438b6
glibc-langpack-de-2.28-251.el8_10.2.x86_64.rpm
1c2f533771c3be155b96e49458e3d693283c714a26a9adbdc2f83fa7fe50495d
glibc-langpack-doi-2.28-251.el8_10.2.x86_64.rpm
e45c09f4b6721fa3315f5d8cbfa0ecc1a50fe02b1c32a0a71f9ed4b32e865693
glibc-langpack-dsb-2.28-251.el8_10.2.x86_64.rpm
3221219511d9ac4cb4972bb02d0a7bc0a93b1356db0dd9c4c00e91bc8fcfd682
glibc-langpack-dv-2.28-251.el8_10.2.x86_64.rpm
a0cfc8bc067cc623dc27f017e991bf6c31faca8f72ec42afbd0b3e4c0af184f6
glibc-langpack-dz-2.28-251.el8_10.2.x86_64.rpm
6b3ceaf5682dbe292ca517f0bf9ff783b6c8724555a6bf00e2794c54ec2c70b9
glibc-langpack-el-2.28-251.el8_10.2.x86_64.rpm
28ed38e7008b49ea51ae74cc8d32d6f7dde6bd1b40dcde55e6f7785e901c595c
glibc-langpack-en-2.28-251.el8_10.2.x86_64.rpm
2d15d11ef45e5ae103a7948524f6b4e1d72fc4c161e375078ff3e501526aecf2
glibc-langpack-eo-2.28-251.el8_10.2.x86_64.rpm
43745e09ad545ce9f092b3f07c5402640d7bc11a28739d914e01685740d9a19b
glibc-langpack-es-2.28-251.el8_10.2.x86_64.rpm
507f3944dc331feba8d74073fff597dc504c4bb849cb585bb8dc50b946fddb85
glibc-langpack-et-2.28-251.el8_10.2.x86_64.rpm
095ec54ceb7c017acf18b54b8b609beccc6d3944801f4fc20b928550cc08b450
glibc-langpack-eu-2.28-251.el8_10.2.x86_64.rpm
02aa6f19a5f096e8ddc4a722e9987f1168e6a8d7f4b42b63eae647ca835b1986
glibc-langpack-fa-2.28-251.el8_10.2.x86_64.rpm
26ef1cfa3bb7f6fad5e1088a725d6cb5c538ab9e006d7560980a9ae6b0ec8438
glibc-langpack-ff-2.28-251.el8_10.2.x86_64.rpm
fa21c2030dfa13ee5e30f48487e0486f981d1340c45463eb27644296334d39f4
glibc-langpack-fi-2.28-251.el8_10.2.x86_64.rpm
8c26534ea2ecb803528fac360d1294be94de958453ea863dd672dacb996bdabb
glibc-langpack-fil-2.28-251.el8_10.2.x86_64.rpm
c57e1b144c9b970b7d28a90446c14b533cb61f2bc3ea19844a3970300b55a74b
glibc-langpack-fo-2.28-251.el8_10.2.x86_64.rpm
383cb74c20f5e1cdcecbe5725dfe78323f7748e246b63e054a0cbc9580bcc5ad
glibc-langpack-fr-2.28-251.el8_10.2.x86_64.rpm
a79b4b5505b207a61cd8fa563d0c394e526dcaf6f177d03bd3efaeaf75f72440
glibc-langpack-fur-2.28-251.el8_10.2.x86_64.rpm
b023bb3b1192a392df3af3ac7c34e325f45e7b762d74ef6e155761bbca182513
glibc-langpack-fy-2.28-251.el8_10.2.x86_64.rpm
e9b37a499075c3f497f5fe468434be09988b78bd7bb1275be33438058f719487
glibc-langpack-ga-2.28-251.el8_10.2.x86_64.rpm
8f79881c318edc8d8426dab4952afa71fa0ee913334523c6a138019d18050e7a
glibc-langpack-gd-2.28-251.el8_10.2.x86_64.rpm
ddb954464578a1ab08c11839fdc87729b64e77d98825972610c5b5c8258ba757
glibc-langpack-gez-2.28-251.el8_10.2.x86_64.rpm
bf61c5ed8af642d9c80d12b812eb28d9cbaccf646b8258bc1dff077728718ad6
glibc-langpack-gl-2.28-251.el8_10.2.x86_64.rpm
1f0b879a2c932a69dae68f2afa3fad4b86edf0e9bd20d89e6b4b1fd1b7700c8f
glibc-langpack-gu-2.28-251.el8_10.2.x86_64.rpm
369146fec93a8a699df6b6e7d88cabdb991583120372beafe5516423c4033cc8
glibc-langpack-gv-2.28-251.el8_10.2.x86_64.rpm
d87bbfd46e3a837e15f72b3145d67312e4ffae9ff02df42bdbed293ba5cdf33c
glibc-langpack-ha-2.28-251.el8_10.2.x86_64.rpm
bb8a77700d4f63b38c9f1cfa03c3eb266d14bdb4983e00297c1a6eba7e78e085
glibc-langpack-hak-2.28-251.el8_10.2.x86_64.rpm
028a64ab550a554f13f2d4e7d5a48ea42e2f49e30062fd71c7d61e5e0df44cd9
glibc-langpack-he-2.28-251.el8_10.2.x86_64.rpm
924332927be6eb3123f138b46eda5d4e75f3813e6628612e9f374f8e3576d5d0
glibc-langpack-hi-2.28-251.el8_10.2.x86_64.rpm
28f9b191b3b92423a451692415347392719f05b940be94a63ed1ccf82c0a113e
glibc-langpack-hif-2.28-251.el8_10.2.x86_64.rpm
4ac49b39ed556f2dc105bcf9fc70dda391d188367959da36dd041ff51e35f5a1
glibc-langpack-hne-2.28-251.el8_10.2.x86_64.rpm
fe41b322e41f6325fd333c603dbbf2eb145749682632f826da3a427e1c429461
glibc-langpack-hr-2.28-251.el8_10.2.x86_64.rpm
549f4fe7a53b40b3db020cce43ea4f690b9095ceaabb91e45da9d029aa5061a2
glibc-langpack-hsb-2.28-251.el8_10.2.x86_64.rpm
f8ec8fe3247b2f76e8dcc84adb53921bf18b188c4a5255e308ca5c0c4b2938c3
glibc-langpack-ht-2.28-251.el8_10.2.x86_64.rpm
d76573de02f63b3cfd96219b403fe3a9bc2ebe797fc9b30d3e5f70ee157fe32f
glibc-langpack-hu-2.28-251.el8_10.2.x86_64.rpm
791f4e4d1bf95ac28599dfa0842bb0630b99365eecd72f11ce49adb9ed848d17
glibc-langpack-hy-2.28-251.el8_10.2.x86_64.rpm
3e9faa93e76752b1d0244b39b902053e449a1f5b483bfca04a29b367b0eed21b
glibc-langpack-ia-2.28-251.el8_10.2.x86_64.rpm
427a67943c925935bf9ffb426883377be8b729e6f9e6475208e8887d998c0379
glibc-langpack-id-2.28-251.el8_10.2.x86_64.rpm
48dd4063c79eca75c2f9a711ca45c836b9711cc1be2c2a5f376ea25b19dc7ef7
glibc-langpack-ig-2.28-251.el8_10.2.x86_64.rpm
5420ec348dcee5c18d891dbdcd01c7d2f40688cffb683451b28f94c575925a3e
glibc-langpack-ik-2.28-251.el8_10.2.x86_64.rpm
8f934a1b52b23274a0c853329d472e5b77a5f817cea22a1c9efd39355f15a573
glibc-langpack-is-2.28-251.el8_10.2.x86_64.rpm
1ae21ae2d5b2168231ad17fdfbc08b0aa86ad723fb8b82c08112a742e1651989
glibc-langpack-it-2.28-251.el8_10.2.x86_64.rpm
bce92f3ce30bbaf64a75164925a72e36389189e33d24fd3dfb06ca676eb73a05
glibc-langpack-iu-2.28-251.el8_10.2.x86_64.rpm
71957c7cc4ea58595ac87d27580b648f86763cc3dee3b91734cc64ac1f99d615
glibc-langpack-ja-2.28-251.el8_10.2.x86_64.rpm
a6b35ef657575f0a61514151fda570f57d8350b151bdde6068453366367a1e48
glibc-langpack-ka-2.28-251.el8_10.2.x86_64.rpm
147b685b5a179f7a4b603d8b9f69f3c88f4c6b843e969981dc6e4e4b4dc5c4b0
glibc-langpack-kab-2.28-251.el8_10.2.x86_64.rpm
74e142ad4472575466c86360fbf98cab1a29667320fb45bc7ed2296fadc3df6f
glibc-langpack-kk-2.28-251.el8_10.2.x86_64.rpm
c065f705098b0a3ce5d55a8fa124d11d8bd427f8bb31385bf141334d5c5e943d
glibc-langpack-kl-2.28-251.el8_10.2.x86_64.rpm
b9981fbb4a6665c60f39c8d89b88644f2c9e8f6ad77f9e634cd19e7d523853e8
glibc-langpack-km-2.28-251.el8_10.2.x86_64.rpm
1f33abafceb005944e31668ccc3cc544398d90a2db773a04ebd143a9484c428a
glibc-langpack-kn-2.28-251.el8_10.2.x86_64.rpm
0493e45cbd6a68e333280e2b1c348a19c98d4e28c07f51062b620c60aa52d8ae
glibc-langpack-ko-2.28-251.el8_10.2.x86_64.rpm
e7542e277eb757c903478e7068cd46d097ed1446ae58a9f9e885f66d5d389c0b
glibc-langpack-kok-2.28-251.el8_10.2.x86_64.rpm
d8cd920473e775b6e38b0777cdad67529b57ddec011218ed8c57285427c68b99
glibc-langpack-ks-2.28-251.el8_10.2.x86_64.rpm
768eb82bece5f0f9533c00e8be8a4a4c460045d2383c9a07536d1230fabde4a7
glibc-langpack-ku-2.28-251.el8_10.2.x86_64.rpm
d35d19485a25a327253ecbf5f418e20657062f4c8140e3ef3735a482c276ff3f
glibc-langpack-kw-2.28-251.el8_10.2.x86_64.rpm
0d3248dfa96b3d88a43086819dc84cb4379cda8a37f770914e905c075ee4b2e5
glibc-langpack-ky-2.28-251.el8_10.2.x86_64.rpm
bdb1ed35128dd6a2fc990940ed0dcae5540f292a3250eb23c01b684b2dd0e907
glibc-langpack-lb-2.28-251.el8_10.2.x86_64.rpm
9d05032ac9c74261cd90944f02365803b97bf04306ec829ca1fe55547a6687af
glibc-langpack-lg-2.28-251.el8_10.2.x86_64.rpm
908b6d437e06bf9ec8cae71481b76cdcb40749ed20d81dbe8077d71ecd0ce8e5
glibc-langpack-li-2.28-251.el8_10.2.x86_64.rpm
5a615049259be94a6246a29cfbf60dbce5af334a291cca2793dae1ac43ee11b8
glibc-langpack-lij-2.28-251.el8_10.2.x86_64.rpm
2220b48243ffc0a49abf8642794f8a80640632b7ced4b8f4aea4d0618578afb2
glibc-langpack-ln-2.28-251.el8_10.2.x86_64.rpm
28758e4fc60ba8f68e0201fa1057224d6edc80b37e53b73c956859da08a2c800
glibc-langpack-lo-2.28-251.el8_10.2.x86_64.rpm
68e4d975e599253241f04d8508ed822e4301d355a7fcd95ceea90227b35f5600
glibc-langpack-lt-2.28-251.el8_10.2.x86_64.rpm
b6e01840a3ec6c9cbd2b42acf3328f76b16851abd5668ef6d08ed70e6e28e27e
glibc-langpack-lv-2.28-251.el8_10.2.x86_64.rpm
23a80868f5904e8a5a42f5b60f5bc6de5e8776a13a58b286242a35f8b4daf2b0
glibc-langpack-lzh-2.28-251.el8_10.2.x86_64.rpm
8173e2480d780004e440c9d8b0934f3c170a9798b9d002ab19361d6b0b2f7144
glibc-langpack-mag-2.28-251.el8_10.2.x86_64.rpm
33d91e0b6e075cc5d51c7c1070d6c477e058f481b9a3db4fa359aabe6ed6f1de
glibc-langpack-mai-2.28-251.el8_10.2.x86_64.rpm
ae10f7b683c3e62248e9d9ea5b9b2b7a704886e1c807223f62f67e71605f5809
glibc-langpack-mfe-2.28-251.el8_10.2.x86_64.rpm
2e4fc18ac17c9f1689fba44dbb41aadc8af1bc37b4ef807e9a9f9dd4fce865bb
glibc-langpack-mg-2.28-251.el8_10.2.x86_64.rpm
950d1e478a3607869b6dfbd588a5bdbdf9dce443bc916f3e9a1338f00067e482
glibc-langpack-mhr-2.28-251.el8_10.2.x86_64.rpm
aac7bd2bfc6caf7185ba1873caed149ceeffd5a88eb95ec5a6afba1e10131edf
glibc-langpack-mi-2.28-251.el8_10.2.x86_64.rpm
af890640054113ecb1df7854eebff20077fcaf6acc6408e79de92a74d1377672
glibc-langpack-miq-2.28-251.el8_10.2.x86_64.rpm
bd491484308b3a1c098888de25cdb8f96f29221c45abd462a0616f1245cf3a45
glibc-langpack-mjw-2.28-251.el8_10.2.x86_64.rpm
b86fdbe41d7966607aad754e19d044f9fec3b28a0f6c439958856ffebe7e26b0
glibc-langpack-mk-2.28-251.el8_10.2.x86_64.rpm
43471447f330f092544c2fd1e11536369a700dadee7ff3bf0824cdeb66354b26
glibc-langpack-ml-2.28-251.el8_10.2.x86_64.rpm
5dcac47b2ca52d9f1ca08aa3ff55eb1524365ddfcb1390a356470eac3963cf71
glibc-langpack-mn-2.28-251.el8_10.2.x86_64.rpm
b1b20399368b8bb11c26de6e29a0c5b990be5d4c68e20ff12095b00e1b3f886b
glibc-langpack-mni-2.28-251.el8_10.2.x86_64.rpm
b175b810548d2bad4dbcd951e75363c24dfc1a36da7399d09f80a873f5514402
glibc-langpack-mr-2.28-251.el8_10.2.x86_64.rpm
d0a50ded1e2a03c8db17e6a3c83bb642f0e36d6d052465ed0b8f4aafdbcf0cf6
glibc-langpack-ms-2.28-251.el8_10.2.x86_64.rpm
e5012c8946248d344ac414ccf22cdfc0086face7c295d0550eda4bb87d91de49
glibc-langpack-mt-2.28-251.el8_10.2.x86_64.rpm
747aae2236f92e24e11dc0662cc289bfc826fa5fbdbe57bae811ed27ff525106
glibc-langpack-my-2.28-251.el8_10.2.x86_64.rpm
7296d88c18ac9dc14a0773e4bfcb09039170661047b5058e852eb13bee31c392
glibc-langpack-nan-2.28-251.el8_10.2.x86_64.rpm
705dfb5c56df42f641db33559cf7eaa871986c198b84b975d2656adada02c771
glibc-langpack-nb-2.28-251.el8_10.2.x86_64.rpm
7527c8dd4e8f8202525b8f69c32c234152d779311278beaea60b8ae0cb9d4e27
glibc-langpack-nds-2.28-251.el8_10.2.x86_64.rpm
295b9a3eae9f74a63cc09a68c0ca5bf866ca78612d8cd106b619d24560d65932
glibc-langpack-ne-2.28-251.el8_10.2.x86_64.rpm
4ceaf4ba8f06752c9fb33a16054589d08838bfca9568c29056799d2ef48d29dd
glibc-langpack-nhn-2.28-251.el8_10.2.x86_64.rpm
0ccae1034dd3394c31e5033dbeea15d414f2c07bbf47f2586c1faf9941c0a64f
glibc-langpack-niu-2.28-251.el8_10.2.x86_64.rpm
cb506ea508e9968608a08f6bc5538cad4914971a42dd53600c129796867923e3
glibc-langpack-nl-2.28-251.el8_10.2.x86_64.rpm
b4fc5a8c24652b6670e5d3f4fc0b721de4ca99979efc4101775bb75acd683277
glibc-langpack-nn-2.28-251.el8_10.2.x86_64.rpm
28e75248ab4d44967378052d7f0da6da0ba786dfc81248c93a034d2a44b9cd5b
glibc-langpack-nr-2.28-251.el8_10.2.x86_64.rpm
d23b7a51a276159f15bc561b5568b0bc74add4ac784a9dfd16ef7c8ca4b0dac4
glibc-langpack-nso-2.28-251.el8_10.2.x86_64.rpm
781f4c439a106d3de8afba100e4cbb0b03116e14edd249d9ebc6a0d30cc81b9a
glibc-langpack-oc-2.28-251.el8_10.2.x86_64.rpm
bbdd72bf1dd2900e66b026ee7dda7282e32fee9e42960e5f3098fa2af22f658b
glibc-langpack-om-2.28-251.el8_10.2.x86_64.rpm
46f273d10c54a975804a977a3602d6d9dc49e7a11c44b3cee8cf68ed9e8a0294
glibc-langpack-or-2.28-251.el8_10.2.x86_64.rpm
5ab828d0723654fe62457a52ed057d9de53b111cf0146dc411c2be822815cfec
glibc-langpack-os-2.28-251.el8_10.2.x86_64.rpm
c423ae35666d1280e8873492fad823eb0c146f528090e59987b40b28392a3531
glibc-langpack-pa-2.28-251.el8_10.2.x86_64.rpm
8c13af6c2019bc154aa7679a599171812fe72e18db51e159504772228147d472
glibc-langpack-pap-2.28-251.el8_10.2.x86_64.rpm
c9d37e8b81880578fdf608730daa29a687fe8f66e6e2519a3d38ae6776a6fcc9
glibc-langpack-pl-2.28-251.el8_10.2.x86_64.rpm
a98cc53b07a295c4583a78456bae37805117ba2b123a748c90b5b06e1c5452f4
glibc-langpack-ps-2.28-251.el8_10.2.x86_64.rpm
4b1093e6b97cb5d52931ad525cd6694b178f2e6c11d35208240c6a9bd6b02ca4
glibc-langpack-pt-2.28-251.el8_10.2.x86_64.rpm
011e482a92769ed7d041fc53d0ab9bf282a7b4892d56281fc3cc66aee5155edc
glibc-langpack-quz-2.28-251.el8_10.2.x86_64.rpm
e773879e393de3e44eccc55c92634557fddc85d4d69006e4b53a573df1223116
glibc-langpack-raj-2.28-251.el8_10.2.x86_64.rpm
8b762be9b70dcc76596d64c5959df48e66acdc21eccd05a0ab0736c614f46132
glibc-langpack-ro-2.28-251.el8_10.2.x86_64.rpm
c47a02e24700a7f94b7364a23d86b1214b56ebd2f77f74348f95ea11ae3a8777
glibc-langpack-ru-2.28-251.el8_10.2.x86_64.rpm
3396b099397b6b5bdc6437275f95359a842c60806606ae7146687c18ab813342
glibc-langpack-rw-2.28-251.el8_10.2.x86_64.rpm
d8ac12464cd4489adfbd0a794068f4af607738e94011f9b8da606f2bdac2ed56
glibc-langpack-sa-2.28-251.el8_10.2.x86_64.rpm
d70ac66e8bddde59b4994554d41a885d037333c188ad7b99a2f3a388ec32be1e
glibc-langpack-sah-2.28-251.el8_10.2.x86_64.rpm
3d32ae6eb8a62b770ccffac7cdbf35bf28dbd109c0d377f2623a040dc041afe8
glibc-langpack-sat-2.28-251.el8_10.2.x86_64.rpm
2c133dd023815b8c8d2d6583a94cb1095e1113a3ffb6156f4d4ecedee4fb1e13
glibc-langpack-sc-2.28-251.el8_10.2.x86_64.rpm
4cd1c112acb51acff3f9def497dabdf51576c542321a8ee1d9c30e4da3f08a4f
glibc-langpack-sd-2.28-251.el8_10.2.x86_64.rpm
05d1b601387c54908d417c435b4ae51e294eac8b5ac0fc0c7087a7fae4f766ea
glibc-langpack-se-2.28-251.el8_10.2.x86_64.rpm
e92ed74284674a50b700bcf5e6cb01b0d65559e43f3930d2152149e7b161ce62
glibc-langpack-sgs-2.28-251.el8_10.2.x86_64.rpm
c38cf7e2973e3853fb6399fbd350f79e886dae2809c02dbdc3361644bf58421d
glibc-langpack-shn-2.28-251.el8_10.2.x86_64.rpm
d673a586e4b58cacde8334b4e6a76eb47682181f834c8c0d28a3707d53356b12
glibc-langpack-shs-2.28-251.el8_10.2.x86_64.rpm
db693e329a857f455666d50df5a4b9de37a89126da8eb57af0d40b4c58ab9450
glibc-langpack-si-2.28-251.el8_10.2.x86_64.rpm
f7b33c8c4f2a4cf6997da629f9914ccb3648440a836f04c46b1ba93dcc3ac179
glibc-langpack-sid-2.28-251.el8_10.2.x86_64.rpm
d9aba5d855e06fb4dc36686085aefa78b3fd4a9c93056fdd6dd7075b69101488
glibc-langpack-sk-2.28-251.el8_10.2.x86_64.rpm
8c5e06362fc0eaabfc5471faae972c2a529c8f0ecdb9d990de4c8a55e948f121
glibc-langpack-sl-2.28-251.el8_10.2.x86_64.rpm
ab104744522496c3de9ca19e8de5ad83bb42b62e13a05f7a3551c1615d3b858e
glibc-langpack-sm-2.28-251.el8_10.2.x86_64.rpm
c02ea9b2c9be0e6147d85316575e9f3431992de58850c556e0fb4e2acde662f9
glibc-langpack-so-2.28-251.el8_10.2.x86_64.rpm
29215a4a5e972a549301f0bc220b886e3df90c09302820198e01e94b9f6b4be0
glibc-langpack-sq-2.28-251.el8_10.2.x86_64.rpm
62c500e321ab48620d8adaa0bca22deb1de0e0714b7e9578261c1acadfce46aa
glibc-langpack-sr-2.28-251.el8_10.2.x86_64.rpm
deea0caaeb473645b5d271a396d93be600993e9a7a08a3701a0a3441c46e0117
glibc-langpack-ss-2.28-251.el8_10.2.x86_64.rpm
537059d5672e5eac8f3da47b65fffdb09adce3a4722d027bbdc29d3f4ce95687
glibc-langpack-st-2.28-251.el8_10.2.x86_64.rpm
aee36035bde544c10eb8e76a70a7f7b35071827eb6ced0a2b8d9d1a157c1d4f5
glibc-langpack-sv-2.28-251.el8_10.2.x86_64.rpm
8521e9fbaa659cbec4ba16807bb8d2390016a6db6b412163f5b404bf8113eae6
glibc-langpack-sw-2.28-251.el8_10.2.x86_64.rpm
630948481031095547ccc8350f4f1d5c637e548981eae0c21069de1b17af7255
glibc-langpack-szl-2.28-251.el8_10.2.x86_64.rpm
f071a52d156069b162b9aaddf515c6811ef36192d11b48d87df62b4f6f4912bc
glibc-langpack-ta-2.28-251.el8_10.2.x86_64.rpm
1d2c33dc8bae67ac2c92a635165b4f58f3ec1f60fa5ab6e3f23c0f3f7626df3a
glibc-langpack-tcy-2.28-251.el8_10.2.x86_64.rpm
66de27da791d3cd480a6a4e2a502bec8e5d19ec24070681129dc5d67b4add03b
glibc-langpack-te-2.28-251.el8_10.2.x86_64.rpm
00a0baee255c77d91758370b7b4b5287334ca66234ef7d16f4687b86723cbb1c
glibc-langpack-tg-2.28-251.el8_10.2.x86_64.rpm
a50b77000337ed72da1264b1c161c5ceb74807511cac386aa3dfa314e194780d
glibc-langpack-th-2.28-251.el8_10.2.x86_64.rpm
f0529acbed431c935e36c46e7f14d769ff4c804e1d9e8f7acd5eb526cc5a891e
glibc-langpack-the-2.28-251.el8_10.2.x86_64.rpm
1517674368390397f426f0ea3c67fd7a8b251e79131b93d034f60739b30eb315
glibc-langpack-ti-2.28-251.el8_10.2.x86_64.rpm
25dc398ef197302d27eadf28d6339752ea8bb6ed237f71fcca8e03f335af294b
glibc-langpack-tig-2.28-251.el8_10.2.x86_64.rpm
77b0c9e8df2fd1b7cdd85fe0271064940d0711f097edbf057d1c6b1e09127ff0
glibc-langpack-tk-2.28-251.el8_10.2.x86_64.rpm
10319835967e2381b17bb23f132cd09df070aff64b6ccf42c3e1511a346474c0
glibc-langpack-tl-2.28-251.el8_10.2.x86_64.rpm
e633cb27568417dea243f96fce7531acb2a057e5eb461cb5c589e493181fb609
glibc-langpack-tn-2.28-251.el8_10.2.x86_64.rpm
f14e289acb068e8fb14afe956b665e7a78efedc3c3a79390b7af72570aec69b5
glibc-langpack-to-2.28-251.el8_10.2.x86_64.rpm
4c303c213849884535e6b24d3a5944b52b16f505325520eb01870848907532eb
glibc-langpack-tpi-2.28-251.el8_10.2.x86_64.rpm
f07271a40f66f69a5c0b9bddbdae234b16044bfa42413e5497d62b24d330732e
glibc-langpack-tr-2.28-251.el8_10.2.x86_64.rpm
4f9f044d198b92e22e7aae0d90f4f65d2b5417a9271b7517bb7e3674363eb79f
glibc-langpack-ts-2.28-251.el8_10.2.x86_64.rpm
0a9fba890241d5b086f896cdaa8bc0f2d0dc1da87caa812b2664a84f130e45cf
glibc-langpack-tt-2.28-251.el8_10.2.x86_64.rpm
f9c99dc8fa89d297fdec0ae9b5d60602fa65271883c15382e270c240d6a0c13e
glibc-langpack-ug-2.28-251.el8_10.2.x86_64.rpm
cd11199feb747051a9ea0aeeb2629262ef1f965b8915686edf2973b69593f793
glibc-langpack-uk-2.28-251.el8_10.2.x86_64.rpm
92f51fabd69cf01d3b696b78388944263cd9f2fd6d5062b1f16db67c5b5ae94c
glibc-langpack-unm-2.28-251.el8_10.2.x86_64.rpm
fabeb82cba4a63dff23e3a7e1083c3372843fa2e4fb2534cdc6a2c8e90822b8f
glibc-langpack-ur-2.28-251.el8_10.2.x86_64.rpm
af9f61592cdeb78896cf3e95c20d7eea922b8d092c725532b44dfbc7ee582529
glibc-langpack-uz-2.28-251.el8_10.2.x86_64.rpm
50dfea55cab019da3dc21168467a19ab6d1b8d976c0e220a3da929299808550a
glibc-langpack-ve-2.28-251.el8_10.2.x86_64.rpm
12b6e812b0c0c796f3f8ff8194a9df5677664da25c19163591153844a72290b5
glibc-langpack-vi-2.28-251.el8_10.2.x86_64.rpm
20146d89efcf2a36e21fef1e628ddb0cd2ff33082b07259bad40a7db3fae3392
glibc-langpack-wa-2.28-251.el8_10.2.x86_64.rpm
f2ee3a8091f0189a52546dc5cadc1cb1efc899f543a787955ba1733395444752
glibc-langpack-wae-2.28-251.el8_10.2.x86_64.rpm
946d7b57c6e4f7f4e3ae73fc20376596fc94b18129cb5073e9c4f90f8caacfcf
glibc-langpack-wal-2.28-251.el8_10.2.x86_64.rpm
1eb5b6015736980bb1f4ae258e16c2f55ffef01ca8209b80120f2ec653f2f2cd
glibc-langpack-wo-2.28-251.el8_10.2.x86_64.rpm
9ef3aa0b287da6d7259426c1bfaf02c6f9877d9e7161bdd39cade8fa35ea2926
glibc-langpack-xh-2.28-251.el8_10.2.x86_64.rpm
e72906723e1db0f1925e77902a0bcb24201dda197cb61ce56fa706402195048a
glibc-langpack-yi-2.28-251.el8_10.2.x86_64.rpm
de41a93b98e40d1490c146487ca67c35341eb1bda3d3eb2ed48d5c34a02ea4e8
glibc-langpack-yo-2.28-251.el8_10.2.x86_64.rpm
84640a518171eac4f3238500a63d21e8afe41b2cb9ef39cd5f81d50bc65290b3
glibc-langpack-yue-2.28-251.el8_10.2.x86_64.rpm
3647320bcaa3ecdb308852d5eae3c2a58ce346d4706ed05315245bdcbb1041cb
glibc-langpack-yuw-2.28-251.el8_10.2.x86_64.rpm
15f5c0455c5ebc565b1b55903b897664b04af020a06a0f04a5af9fe9933db2d0
glibc-langpack-zh-2.28-251.el8_10.2.x86_64.rpm
9b95cf02bfe604019d0e89a00bcd87b0545dc3d939674e928ca8e1f79b40b58c
glibc-langpack-zu-2.28-251.el8_10.2.x86_64.rpm
35575ee72fe54d0dafb11b2110cc9a081d2a1ffa2959f8480894ba8845495112
glibc-locale-source-2.28-251.el8_10.2.x86_64.rpm
19a07e625196363d6ba81eea384357f812b4c2b73d194cff47d8cdacb5920909
glibc-minimal-langpack-2.28-251.el8_10.2.x86_64.rpm
90510c6fcf5524985073971cf42c731b0b3bf2f6680e26cad763d8711df9e63b
libnsl-2.28-251.el8_10.2.x86_64.rpm
d2d8fb740919f57a31c5777162d24756bfc1c9012d83473f9272155bbb974dc3
nscd-2.28-251.el8_10.2.x86_64.rpm
2d16aa6ff80372dbfd8061b0e5e243d04d64c1309f5b0362a27438fc9f01254b
nss_db-2.28-251.el8_10.2.x86_64.rpm
042c11844b92847f0e672eb3902f56577e075dd8b286597b2769b4bf701e1deb
RLBA-2024:3151
acl bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for acl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
acl-2.2.53-3.el8.x86_64.rpm
2667ccc2ac3114b73508e2c614502cb629a573b92a49dc0260c685951b0222a5
libacl-2.2.53-3.el8.x86_64.rpm
c991ac32e6016a1e7a149f8bfe7600d831c2db2a2db2299d7e09710785c789f5
libacl-devel-2.2.53-3.el8.x86_64.rpm
8c4e9c634f13e89d78d6049fcf8c18ff36d848197cb57a9bc8a3a76de72e5379
RLBA-2024:3150
python-urllib3 bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-urllib3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-urllib3-1.24.2-7.el8.noarch.rpm
9b2db8ee6315e4ce5bfa1224dae9cd74ee4807b04b4911368193d3982875fd5c
RLBA-2024:3149
autofs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
autofs-5.1.4-113.el8.x86_64.rpm
803a8b37bdac877dedd9c9fdb5ad7b2e1163285beb40d515b7a53a70143cf3ee
RLBA-2024:3159
python-linux-procfs bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-linux-procfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-linux-procfs-0.7.3-1.el8.noarch.rpm
c726c1c16d23294bcc9d933f2a146650cf699f96d2e78da4a30b24643bbcf211
RLBA-2024:3158
mcelog bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mcelog-195-0.el8.x86_64.rpm
82a0883eb3bc726ed30776b086b5be95d1dc2e61199cd7b019e2ab74cc23309f
RLBA-2024:3157
cockpit bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cockpit-310.3-1.el8_10.x86_64.rpm
7554f03a83578a9dd806f208b9ace264a85d6924a09c918d1d888c4439f05cb0
cockpit-bridge-310.3-1.el8_10.x86_64.rpm
05923f07753ee5bbc67b2e54e5d9be36cbe939d710c8238ea4f1b9acfdb60766
cockpit-doc-310.3-1.el8_10.noarch.rpm
09d0260587da36d67475c95ae593e4eab984d050065fec136f63724601599339
cockpit-system-310.3-1.el8_10.noarch.rpm
39da3e77b24c240578a3603b653963535da509fe39873db0dc313ba300eb465d
cockpit-ws-310.3-1.el8_10.x86_64.rpm
8d94bcedc0a679a787de1b4cbda77cdb1866392a3325174b04e7127059b95990
RLBA-2024:3165
cups bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
cups-libs-2.2.6-57.el8.x86_64.rpm
aa9e53a2f40bbfcd9a4c653d70fce21cb7470d078f80067661c0b0c4d81059af
RLBA-2024:3164
dnf bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-4.7.0-20.el8.noarch.rpm
fa9560a29d68f159a8f9db7fd874c5be638e9a19d83af1dc50c2c49c7895e425
dnf-automatic-4.7.0-20.el8.noarch.rpm
59a202af22c1d767d75fef1277304393f2bed7134666b6c69eb820579bf830c6
dnf-data-4.7.0-20.el8.noarch.rpm
d2c0ba2bdb3d72d558a4467afea5923c27cdcda5b41f0c23e0d3b9a0881a1e7f
python3-dnf-4.7.0-20.el8.noarch.rpm
8195a2a40afcaef2c3c0d9b288bde41ab71847cc2fe2ba24f113a4ae980ca99a
yum-4.7.0-20.el8.noarch.rpm
2793583cffdb76e783f1f58fc0f6a19469ac49e7e54726240774257df95e745b
RLSA-2024:3163
Moderate: pam security update
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: allowing unprivileged user to block another user namespace (CVE-2024-22365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: allowing unprivileged user to block another user namespace (CVE-2024-22365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
pam-1.3.1-33.el8.x86_64.rpm
9f463d7bebe3e53f46a8170d9b2a2b2d89d99827dd8407e589320de20c532ccb
pam-devel-1.3.1-33.el8.x86_64.rpm
1c969bdb0d9fc2f2047519754560ca30218da64d822c2d08df1cce1830e99d8b
RLBA-2024:3167
rdma-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rdma-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ibacm-48.0-1.el8.x86_64.rpm
1265c29400c9e2a2befa7c7f10463048de849e2a6be7ac3f1c4b72058fa5ea18
infiniband-diags-48.0-1.el8.x86_64.rpm
abb2e5b1eaa18c632eb947f93c13b9267d85bc8cf15b714a1c099eb62c66b9b4
iwpmd-48.0-1.el8.x86_64.rpm
96ffde37f3048734f6346e193d493f71f33a9c7093a1f83d2aeb9178984163f9
libibumad-48.0-1.el8.x86_64.rpm
2810d615e91a15c1e435bae6afbc46917a04573b93aa439eec113c93a71b08a5
libibverbs-48.0-1.el8.x86_64.rpm
5fa3a8658b9788f0e5fa01feb6ef7e827b3b9d0b85df1d8d83d048c26fde30d0
libibverbs-utils-48.0-1.el8.x86_64.rpm
80b18d5eba6a596981955a6351922a15d9c122a9d601a25863881aa892d7472b
librdmacm-48.0-1.el8.x86_64.rpm
dda55f350f3f8f873ceb4b792c00480db4bc98b470c143e54126b793f34f705d
librdmacm-utils-48.0-1.el8.x86_64.rpm
98635409f67fbc52ce8dd90d64c8ab7b778560a8009e3818db7ce4b2aa9f5f49
python3-pyverbs-48.0-1.el8.x86_64.rpm
7bc308339ab8e0eec6082f6143c791ab5b6fc26a61286e3a155db782d0e52284
rdma-core-48.0-1.el8.x86_64.rpm
3d49ff969a5c2f7e165150d5e320d21b9f1bf7371e9e51b8534d806438d6dad0
rdma-core-devel-48.0-1.el8.x86_64.rpm
334e283a95c7b29458c43c403a1efa6730e09f6d8d50759fa65dd588b9f5968e
srp_daemon-48.0-1.el8.x86_64.rpm
aeb848d8665c1a92e4ad45afa8b6d3bab105f2f217500e75261076eabff5d3bc
RLBA-2024:3169
dnf-plugins-core bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-plugins-core-4.0.21-25.el8.noarch.rpm
069c1e02fbed2d9fdee08d1b9bfb09f590d27b88da3b273f33cd9314a7f803a4
python3-dnf-plugin-post-transaction-actions-4.0.21-25.el8.noarch.rpm
8e9283d4362cea2328da7f8e203a93ca9adf6df29da1ee210c573439b4ecb399
python3-dnf-plugins-core-4.0.21-25.el8.noarch.rpm
236c8eff4747c7391433cc2a447ac03ea95c39307de117a45a4d7bba298a20a9
python3-dnf-plugin-versionlock-4.0.21-25.el8.noarch.rpm
5c5078cbf684d477d9b77e31b8bc227d14f3b2fbc6a8b591ba72a7f8681e2e77
yum-utils-4.0.21-25.el8.noarch.rpm
7ccf9325c27dcbb50eba6ebeada3bef286c402e7edc866d73933099fb50fddac
RLEA-2024:3168
libkcapi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libkcapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libkcapi-1.4.0-2.el8.x86_64.rpm
662a680bb74d3039604e1b27b61b2df2c43bceaa2eae50cf06b0fefacbd7516b
libkcapi-hmaccalc-1.4.0-2.el8.x86_64.rpm
df58365d7ff391c3fbe7d69738778a7f2800f1cbcfa18110043619581550e323
RLBA-2024:3173
audit bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for audit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
audispd-plugins-3.1.2-1.el8.x86_64.rpm
94a78ef2115b063d8c2f983eab93692d09fb333028d2f1d7ff7ca9fa86278775
audispd-plugins-zos-3.1.2-1.el8.x86_64.rpm
7596a8d67b4aabb85ed8f3d0e13c803cbe5599ec5b93a80dac029410442df85a
audit-3.1.2-1.el8.x86_64.rpm
c94e3b589da8d66aa24bc19d41c199c0b400ac47a583baa7de57d92820f3a915
audit-libs-3.1.2-1.el8.x86_64.rpm
6225888056c3fa4df635f03c45ac6cd21c8e3219ed93d4591c7fb69dae42a701
audit-libs-devel-3.1.2-1.el8.x86_64.rpm
5b6f139b07fc7c6da6db32c9ab8dd8e3702613332c2d4ba83e2b88a3d5739052
python3-audit-3.1.2-1.el8.x86_64.rpm
1931f2508ff87f5d31318b265a5e45475e807cd6e8904e32776903eac6e0e4e9
RLBA-2024:3171
mdadm bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
mdadm-4.2-14.el8_10.x86_64.rpm
bd2596d518b4053803b15650f22cde7d20de90e33527149b6b106e20ad39421b
RLBA-2024:3177
numad bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numad.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
numad-0.5-27.20150602git.el8.x86_64.rpm
1496b6e93fb2ff201a5760d3bcab32b2482f3c3e2c81cb019a31cbdf8c287dbc
RLBA-2024:3174
findutils bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for findutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
findutils-4.6.0-22.el8.x86_64.rpm
e0905d9dbe378412c421ad73ab8729a434f9dc27f0debf1ac7b568cfeedfe98c
RLBA-2024:3179
avahi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
avahi-0.7-27.el8.x86_64.rpm
86380ee0d93e20ecc84f449605412f9285f1133e8806cb935a40b40e064f28ae
avahi-autoipd-0.7-27.el8.x86_64.rpm
66b19f8c25baaa7115ce7cbbd99dda714ec17f88f5b3c6bd4f209fb9cee84937
avahi-glib-0.7-27.el8.x86_64.rpm
cec2bf18b824521afc4dcabf315f457e09d326b76c2dc74ca8e0358419666fea
avahi-gobject-0.7-27.el8.x86_64.rpm
5e20ad80353555298fc5a3e6e2e783f44284bac6f55f6342561cc2120a967152
avahi-libs-0.7-27.el8.x86_64.rpm
cc891b32a2d955dabade372d294ca4e41f5cf075ff32fde0d7720a413de6d07a
python3-avahi-0.7-27.el8.x86_64.rpm
7353bddff8fd908a396505622d6f1b5084805597387d15f0e11f6bafae419e2b
RLBA-2024:3182
smartmontools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smartmontools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
smartmontools-7.1-3.el8.x86_64.rpm
7885727656e745420bdb87b569978ea99ba025def417b1598152b84abbcbbfb4
RLBA-2024:3180
dracut bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dracut-049-233.git20240115.el8.x86_64.rpm
8d62ebbfedde9e790f73c2a5fb1c7f94afdebe83f4b0c19fd2e72a285b2d52de
dracut-caps-049-233.git20240115.el8.x86_64.rpm
8b47766711f7b0c1291a3f3ac52d52179a849ddd899937a6efb2449d3d35a588
dracut-config-generic-049-233.git20240115.el8.x86_64.rpm
5450cdf4149cd959ed92252e4edccb188149ee06067f6bae2abfb194823b97c0
dracut-config-rescue-049-233.git20240115.el8.x86_64.rpm
729aecd3990f0a5659fe497d82f3e3b834c3041078217dd1fa163bb401bf6abd
dracut-live-049-233.git20240115.el8.x86_64.rpm
1101c60660ba1b9287b94dffa27dbd05c207d9cebacaa73cdcb0e679c71a9e00
dracut-network-049-233.git20240115.el8.x86_64.rpm
258d3af5fc6a90a9f43d8efaf3ff9aeafb2220fcd9334271bc62964c412bab24
dracut-squash-049-233.git20240115.el8.x86_64.rpm
94c217da0075819d60dfb2d70f3fe48f0d810c81f985f3414946be475ec5b688
dracut-tools-049-233.git20240115.el8.x86_64.rpm
8d579b132cd47814b9e3e03b2bc541d10e7bf17d80841bc01e1af705e96a83eb
RLBA-2024:3181
tpm2-tss bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-tss.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tpm2-tss-2.3.2-6.el8.x86_64.rpm
b1e62af9f2b0b18cbf06a5e6f6e874700b293bbcc8596d6970a9c00d2df2df0e
tpm2-tss-devel-2.3.2-6.el8.x86_64.rpm
9a575b1bddd6ce89b3ddfb2f2f6c05c1ef430970b73d82580d87a9bee526b4ae
RLBA-2024:3186
libldb bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
ldb-tools-2.8.0-0.el8.x86_64.rpm
0e83dd304e9de8868fc2bbe1d73e59a4ae7d0933e2232ee1b1a15c409bf803b2
libldb-2.8.0-0.el8.x86_64.rpm
a43740feaacb50156412dcf9deac677fdc72e785998b0abe8d5de9ec9d94494c
libldb-devel-2.8.0-0.el8.x86_64.rpm
5215e65b5dcc917f77a5ea56a46ee4c4b4ae1ce4160a996367be0ff0e53292ce
python3-ldb-2.8.0-0.el8.x86_64.rpm
fabd47906c0dc2bbbdbae77fa57916eaf2090e9ba335272728205658fcc53ee7
RLSA-2024:3184
Moderate: grub2 security update
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048)
* grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692)
* grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048)
* grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692)
* grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
grub2-common-2.02-156.el8.rocky.0.1.noarch.rpm
8672438a84f9c0ea80fa80d375557bd1965460bfc0e24f4ab27705f85b4f467c
grub2-efi-aa64-modules-2.02-156.el8.rocky.0.1.noarch.rpm
21a7a7b661d4f5176b5ddb73a171660a0b90f741ba19e5a986864b5d697623b0
grub2-efi-ia32-2.02-156.el8.rocky.0.1.x86_64.rpm
1b2e15ba1c12783aafec60e0d114d4c0a88f1ce9f0732797bf57cc612e6799e0
grub2-efi-ia32-cdboot-2.02-156.el8.rocky.0.1.x86_64.rpm
bcb13327e41ff23e3b2be6db0de2e265a40e1c2b8f3ec85a71d53d1913363893
grub2-efi-ia32-modules-2.02-156.el8.rocky.0.1.noarch.rpm
6a055a026ac4cf272378b45157641031445cc6c7008eb177a1e9bf1e4e188003
grub2-efi-x64-2.02-156.el8.rocky.0.1.x86_64.rpm
285f67755d57f5cb4c1ac136ab3bc7574f73dd988cd9f47ff970a08435caa599
grub2-efi-x64-cdboot-2.02-156.el8.rocky.0.1.x86_64.rpm
254e87a15a5bc68421590213ea69b8b609befaea10ae77abd91b0dea06a48127
grub2-efi-x64-modules-2.02-156.el8.rocky.0.1.noarch.rpm
27b17a886367eed378864d93b9e159725162596131c95d588196e86ad37e301d
grub2-pc-2.02-156.el8.rocky.0.1.x86_64.rpm
a0b58780d04d9b7bbc7575b0206aa1afa6a8d771d4f2d616cf725aa7a06c0ee8
grub2-pc-modules-2.02-156.el8.rocky.0.1.noarch.rpm
c376d6bd24f24eb4869a4305c6ab2ef98a59f352996d45357cac4b2a1b7e2781
grub2-tools-2.02-156.el8.rocky.0.1.x86_64.rpm
638cee01d00640e8238ed9f9f62caf14a05b2483d3a4af8c11d01dfe25b14dd4
grub2-tools-efi-2.02-156.el8.rocky.0.1.x86_64.rpm
dcf9b82ddef8fdf1b8ba337deb85cc5ec9445519be959b973d5d5f951e1f5145
grub2-tools-extra-2.02-156.el8.rocky.0.1.x86_64.rpm
586444677a7bb8e51d1e524d19b67d6a698469fdb314019dfa8f4fc188d31ced
grub2-tools-minimal-2.02-156.el8.rocky.0.1.x86_64.rpm
21d31f89766504976089a4dd05f29cf60a2dc4c8b20c230a8dbdb090d12f2d0e
RLBA-2024:3187
libtevent bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libtevent-0.16.0-0.el8.x86_64.rpm
da7ad69c30733423d56a7e62cb6f120cdfae0ffafddc3b1d7afcaa1c2de81480
libtevent-devel-0.16.0-0.el8.x86_64.rpm
59add89dcf3f92e285e526e2489e6b42ccd23e01df88108ef00d75819d09f969
python3-tevent-0.16.0-0.el8.x86_64.rpm
930aecaee8c07c8e2f84f9bd692c5d7fd6171f335a3e4fe0caf74fef23fa0dd3
RLBA-2024:3190
trousers bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for trousers.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
trousers-0.3.15-2.el8.x86_64.rpm
5b2013e3caed8ec7d711d20171328599927401c5e2ed02b030071d786aa889db
trousers-lib-0.3.15-2.el8.x86_64.rpm
32da7eb0aaa584cab9637509b9b1bb5b8ef23654968c578db90eb966008dd565
RLBA-2024:3197
librepo bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
librepo-1.14.2-5.el8.x86_64.rpm
f881cdfd57a260828d4e4aa1119b87de01ba14b3305759b171008a6189bd3094
python3-librepo-1.14.2-5.el8.x86_64.rpm
6302524b08407755ab7b7eb9d83b6d2661b086732cf4a501b97c3c8df40e5b3f
RLBA-2024:3195
subscription-manager bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
dnf-plugin-subscription-manager-1.28.42-1.el8.rocky.0.2.x86_64.rpm
c2ca2e3445b4921c1a565aefc049dbb28bdb05082f858793e42d969c74830862
python3-cloud-what-1.28.42-1.el8.rocky.0.2.x86_64.rpm
d34b407e6ef82436392704a4ed21755eafa8671f658521c3840e930ff4ab156a
python3-subscription-manager-rhsm-1.28.42-1.el8.rocky.0.2.x86_64.rpm
274a221a3c89a4d35ab97efaac8438e79cae0e19ab54796e2bad764f83cccf42
python3-syspurpose-1.28.42-1.el8.rocky.0.2.x86_64.rpm
b7c34bdf0c51b04a7881d335991dd3f6fcdfc99a05543591efe0ac19719b61b3
rhsm-icons-1.28.42-1.el8.rocky.0.2.noarch.rpm
d65e834f65e012f7d86c832024ad0aed7f47cf0d1fa8f17cfdf08d33c986b76d
subscription-manager-1.28.42-1.el8.rocky.0.2.x86_64.rpm
c011e97749c24bf9862768f89c2af31db3c5fa30c5394a36a88eade61744b63a
subscription-manager-cockpit-1.28.42-1.el8.rocky.0.2.noarch.rpm
65db90606dffb188dec079966e58bd4d21a51a41852008b594d0f79b84e0a4a2
subscription-manager-plugin-ostree-1.28.42-1.el8.rocky.0.2.x86_64.rpm
9c9aa52defddef00ed802d4365c98bfd51b0cf40b9e6312cdaa31058fcab3326
RLBA-2024:3196
alsa-sof-firmware bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
alsa-sof-firmware-2023.09.2-1.el8.noarch.rpm
0434bca02fec77f340b26be7279df7d88f1d33ae4a236e4cecb1df5210f2511b
alsa-sof-firmware-debug-2023.09.2-1.el8.noarch.rpm
52838109eb8dae18f5d10ab3bc623311bd41c533599734d7146e6840a7dd259b
RLBA-2024:3198
shared-mime-info bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shared-mime-info.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
shared-mime-info-1.9-4.el8.x86_64.rpm
3d6018477c7c8089f49b2276821c43659470f67b569c670d2f2d30ca5e308ac5
RLBA-2024:3200
smc-tools bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smc-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
smc-tools-1.8.3-1.el8.x86_64.rpm
998f30d545fc7c0035ac0eb8a7cde1f57ef195a066b70259b5dead59d02859b3
RLBA-2024:3199
opencryptoki bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
opencryptoki-3.22.0-3.el8.x86_64.rpm
4e54a2719a230304786c654935f1989621d0afaf4b1dde67ed82094eff274f58
opencryptoki-icsftok-3.22.0-3.el8.x86_64.rpm
12505a8c21081c544dc643cdeee426c58580088f9a747891159354eb6a49e7b4
opencryptoki-libs-3.22.0-3.el8.x86_64.rpm
f1b28805c63b5987bd615d59df47609a4703bec8e8ce0ee862819119621001c9
opencryptoki-swtok-3.22.0-3.el8.x86_64.rpm
3e2f4f8b4c630b373bc34319108b340981ea93a1425a2a5b8377c1ba19f1b226
opencryptoki-tpmtok-3.22.0-3.el8.x86_64.rpm
5befadd48289b06ac7dab72f7edf2a169f37825989eb333930abfaa25cab9036
RLBA-2024:3201
numatop bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numatop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
numatop-2.4-1.el8.x86_64.rpm
2b8c93f2946670f62c21031a6107ee6084d18906269a70408b6c78fe07e6da98
RLBA-2024:3205
iotop bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iotop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iotop-0.6-18.el8.noarch.rpm
6b9def672669de10601625eefd3fb0277e1f327e33a12a85bd06881129081010
RLBA-2024:3206
perl-HTTP-Tiny bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-HTTP-Tiny.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
perl-HTTP-Tiny-0.074-3.el8.noarch.rpm
ce9e9ec3f33a863a4821fb6fdc872c1cef1f1fae0b63ded1bee3ea25bdd25e7f
RLSA-2024:3211
Moderate: traceroute security update
The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host.
Security Fix(es):
* traceroute: improper command line parsing (CVE-2023-46316)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for traceroute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host.
Security Fix(es):
* traceroute: improper command line parsing (CVE-2023-46316)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
traceroute-2.1.0-8.el8.x86_64.rpm
d12d2e374bf70524db0c077b8a8fced43cd16fb68f7af569a11f2a352a90f460
RLEA-2024:3209
tzdata bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tzdata-2024a-1.el8.noarch.rpm
cce3fd2ca0fc64023c22f9a242d92bbfe3685429daa64b0ce7956de025dde066
RLBA-2024:3216
net-snmp bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
net-snmp-libs-5.8-30.el8.x86_64.rpm
679cc421ef98607407549bd74f7a9fe1ff598b46cc23719b3cecbf2ebed2022c
RLBA-2024:3220
python-pip bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-pip-9.0.3-24.el8.rocky.0.noarch.rpm
48027ea5f805c0edb218fe0f241d2b0c34e9f1be8e828997516766dbfe7f96e6
python3-pip-wheel-9.0.3-24.el8.rocky.0.noarch.rpm
ccc41a042fbfc423e7cac48dbf161f94d6da6196e1770d2e6bb00232bdfef2c0
RLBA-2024:3225
sgpio bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sgpio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
sgpio-1.2.0.10-23.el8.x86_64.rpm
368ce9cf01848509694dbfff771b04f2ebe60b0bd22101c2965497a346b2655c
RLBA-2024:3223
fuse bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
fuse-2.9.7-19.el8.x86_64.rpm
57de797128217bc9094edd4305428ce2ef7323e1fffac4bd0b8382481c8b5aca
fuse3-3.3.0-19.el8.x86_64.rpm
b0d579580a44bcce22ba6b613d4e152f3c0589e6a5eb600b8e1da6458433fffc
fuse3-devel-3.3.0-19.el8.x86_64.rpm
803b51c723b4f72389089bc517ce2a0b9f627feadf86c36c6851b995ba72f626
fuse3-libs-3.3.0-19.el8.x86_64.rpm
e3d7a931410bdd4a0c1339332e30a06699da1d2f2daf56145e70b229492d4c81
fuse-common-3.3.0-19.el8.x86_64.rpm
2a3bcd2392254f550f19059dac945e67e18ba8705f2d0f2057609142fefd48b2
fuse-devel-2.9.7-19.el8.x86_64.rpm
5e1ca22a2aeb6de60daa91eb68af1da88ea4fb753f9b0f02a199bbcb24bfa4b4
fuse-libs-2.9.7-19.el8.x86_64.rpm
bdea8cce8155d059af4b5f88ac89f21e61bd1dee1ea1c4849524a96f08e8731f
RLBA-2024:3221
tuned bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
tuned-2.22.1-4.el8_10.noarch.rpm
98d42bb16c8dd7ebc21b8b2619c6de04db2ef88b8308c6cbc61d5be4138e7785
tuned-profiles-atomic-2.22.1-4.el8_10.noarch.rpm
ce9584475dd7a313f00d838b5f680bf9107b4315336d87af55f2760091a5430b
tuned-profiles-compat-2.22.1-4.el8_10.noarch.rpm
b0f063d48939f443ec742495e02a9b975fd37fa20245f2c2ee19441b9935508c
tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.noarch.rpm
549ab06fd76f805bdcc0f610f089c47e04db2413433309be863bd25da4ffeafd
tuned-profiles-mssql-2.22.1-4.el8_10.noarch.rpm
6a4de3754851d2f7503d683655933e59b541b97c01ac98de306c7959477137dc
tuned-profiles-oracle-2.22.1-4.el8_10.noarch.rpm
534208b9e8f20cff79150b8a9895af71b1c3414847d02970062037baf3235459
RLEA-2024:3227
intel-cmt-cat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for intel-cmt-cat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
intel-cmt-cat-23.11-1.el8.x86_64.rpm
bc736cc1a92f75e4c32601a4462e1d891459c7b3791a01ba597977b60b895a85
RLBA-2024:3231
realmd bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for realmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
realmd-0.17.1-2.el8.x86_64.rpm
46ca49cd546df2738a84ea6f1437644b60ef2e4ac9f772c0071a7e4ce3fca073
RLBA-2024:3230
file bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
file-5.33-26.el8.x86_64.rpm
1391537ab59f4423693611d9afb72a18a8d5574c8b09900dc0c1d8aaa6d6983d
file-libs-5.33-26.el8.x86_64.rpm
27178435ffb2835e5a2ed27c89db8ca176d9495c38e1ab1bb46b8f06c6b2f480
python3-magic-5.33-26.el8.noarch.rpm
83c0b04c8f15ca79012c86a0915dcf0fc5026dc22bebe3de26806cf614fdfbe0
RLBA-2024:3237
bash bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
bash-4.4.20-5.el8.x86_64.rpm
572aa2bfce0cc39f9ddbb695f17edf5bb5c766a8e2a4c72591694de467dbfe49
bash-doc-4.4.20-5.el8.x86_64.rpm
4f2b4838dcd441a61bce489da3b481a5209e01e1b78afb6455d0ae80f57dd97b
RLBA-2024:3236
expat bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
expat-2.2.5-13.el8_10.x86_64.rpm
c97b00315444ad9c8f95de3485e98f324848edc2ec470e2a42689512ebc9300c
expat-devel-2.2.5-13.el8_10.x86_64.rpm
211e33bcc5e3fe3e2e5d4191e83047784ff7f87f825938424109a476d6c80a4b
RLSA-2024:3233
Low: libssh security update
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004)
* libssh: Missing checks for return values for digests (CVE-2023-6918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004)
* libssh: Missing checks for return values for digests (CVE-2023-6918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libssh-0.9.6-14.el8.x86_64.rpm
7a5e3ecd7deaec39a87dcdc6728e29aff4d690c4400c24848da23e1bf262f02b
libssh-config-0.9.6-14.el8.noarch.rpm
802ffb16ca31193afc400d9f057f8bcb04224a85a3452fd878cb4a088823dfe5
RLBA-2024:3232
freeipmi bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeipmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
freeipmi-1.6.14-2.el8.x86_64.rpm
4454067a327a516ad5ec421d4276c6b26b669cf1b34492ce14ff790d2455ed2d
freeipmi-bmc-watchdog-1.6.14-2.el8.x86_64.rpm
b817f9dc081f08db237f2747ecc04a928ddb164cbf29ef044a79d1bba758750d
freeipmi-ipmidetectd-1.6.14-2.el8.x86_64.rpm
c9abe01d444c666c88d44b249ce056c31b76aa71b3aa37c7513833bf2f66a92b
freeipmi-ipmiseld-1.6.14-2.el8.x86_64.rpm
fbcdd7446af52160bb0f8a0b4812ebd7e13aaf9bbfb216aab53e7063658c8f54
RLEA-2024:3235
iproute bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
iproute-6.2.0-6.el8_10.x86_64.rpm
f41e8aa9042f3db1d45a98cdd7317f770aaf6f3a734cba6a4f439094b31550b7
iproute-tc-6.2.0-6.el8_10.x86_64.rpm
14f36fe3ae67abf016936643c0d21e89a125f0a2fe083f60f9593b6421c428a7
RLSA-2024:3268
Low: krb5 security update
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)
* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)
* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
krb5-devel-1.18.2-27.el8_10.x86_64.rpm
1239c701de29f5199962fd28759a84edbfdffed48187b2edc701e392d9f9317f
krb5-libs-1.18.2-27.el8_10.x86_64.rpm
ddf88e97fb20aa3df6585c929637a8e2300fdf3c53a9789c484e2b53bfbeb1dd
krb5-pkinit-1.18.2-27.el8_10.x86_64.rpm
33becdaca5a49807681e04c8ad1017e4040367ff6e608b79b89ce48dfa78acc7
krb5-server-1.18.2-27.el8_10.x86_64.rpm
5c557272e00b0f649775219233b99f6e5743dac738b1506d04692f6f3e0dee74
krb5-server-ldap-1.18.2-27.el8_10.x86_64.rpm
0e9b4cc361baaad86cdb982a60545e4f6df1dfe1ffef5c83500b10fa1a3b5f71
krb5-workstation-1.18.2-27.el8_10.x86_64.rpm
6314d2e8f927049ef10775e37a7cf2221bb0931c0c0e67e023d7bc1adc346935
libkadm5-1.18.2-27.el8_10.x86_64.rpm
1ca34d92e288eb08f7435c5782c50e1682346759299c1472ca22c8bffe834f5b
RLSA-2024:3270
Moderate: sssd security update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libipa_hbac-2.9.4-3.el8_10.x86_64.rpm
fa30bdada92eb662984a77fac2b25c08435523da160b059280c735f9572085fa
libsss_autofs-2.9.4-3.el8_10.x86_64.rpm
7f7720daea270e162cfd68e82f12020ab6c8758e741d33863e022ad90afec109
libsss_certmap-2.9.4-3.el8_10.x86_64.rpm
92a35f896709e628f476e8d68b961528e168bd7e441bf1b96f716261616f7f9f
libsss_idmap-2.9.4-3.el8_10.x86_64.rpm
62821d16042a67f2930a11085bab80380bcd147b73bc3efa96dc84d112691048
libsss_nss_idmap-2.9.4-3.el8_10.x86_64.rpm
8d1e90a2f14765e6a88c69c5db7e6abcbeff8da62b164f12d36410173780f434
libsss_simpleifp-2.9.4-3.el8_10.x86_64.rpm
db0c4b8027976edf1ccb8540540cb3ec2344e6ff4c7c0c499d951ac21b4e9aaa
libsss_sudo-2.9.4-3.el8_10.x86_64.rpm
5be624b3fedd8b76d2e72f8337c062dc6145dda214f60b3bdeef30a3ada73da5
python3-libipa_hbac-2.9.4-3.el8_10.x86_64.rpm
c4dfefa67d31b8609ec921f2212b87136a1a3d8f810af73440ad0e9909182625
python3-libsss_nss_idmap-2.9.4-3.el8_10.x86_64.rpm
77b080c1f4219e3a1821d057380839b421c0a848c2a41568202e295f3fe90603
python3-sss-2.9.4-3.el8_10.x86_64.rpm
f5b5886a2e64e82d20e7aa2e566d6205be366c5b5b93f29a385ff965bcf26424
python3-sssdconfig-2.9.4-3.el8_10.noarch.rpm
f298ff9bf27268b86d01be28afeafd0ebc50b830ea4f338f8c222950c7feae15
python3-sss-murmur-2.9.4-3.el8_10.x86_64.rpm
8eed0e2f48a16fb3da1f79a10f8fdc3d79f4b77f1cb918980f5e04e7274af88f
sssd-2.9.4-3.el8_10.x86_64.rpm
c398ea23cfce0275fdc9e773f2e4999cfd2425ad5752197b5209274cb98bb2fc
sssd-ad-2.9.4-3.el8_10.x86_64.rpm
db4dc747049e824dce2a2bc4db9c8d765ffda107ad82484f6d94ca2a3e36556b
sssd-client-2.9.4-3.el8_10.x86_64.rpm
32a033e4e941ef4dd9deaaf1269a489993a3b061714fa3f8d9bb69da6c30c8e7
sssd-common-2.9.4-3.el8_10.x86_64.rpm
5b00446afb108093a7f6d33bd7a427f2b25806ec98bc92953e58faff6d4c39dc
sssd-common-pac-2.9.4-3.el8_10.x86_64.rpm
baec6bd8f9847ce5a3c0e978e3cd4ee3408df6b1b4abcc26de98ad9487c38d08
sssd-dbus-2.9.4-3.el8_10.x86_64.rpm
c57f75dfe9d5c11449ffd71cc42cce0123923b9b2f29966861163fb191aa8231
sssd-ipa-2.9.4-3.el8_10.x86_64.rpm
f7c92d95b0576ff2d72ae6c2145c210fbff60e8f49290154fdc5f06a4079a99c
sssd-kcm-2.9.4-3.el8_10.x86_64.rpm
489988c74b69564cf568924e2a70a7ce191f529872e76235b048f03e36ca8aa8
sssd-krb5-2.9.4-3.el8_10.x86_64.rpm
78c3d161b79cfa3fea66d874b66d7a607a4ea0a74945e738ecd74128487ab140
sssd-krb5-common-2.9.4-3.el8_10.x86_64.rpm
e977b775085913a671dd7c9ca6e8cc8009bcc656e2a10ac2a3364e46a876585c
sssd-ldap-2.9.4-3.el8_10.x86_64.rpm
2df6b99f746c5668cc5d31e7dbe87acc15e3c6f4bc5f352484dcf3697261d4ba
sssd-nfs-idmap-2.9.4-3.el8_10.x86_64.rpm
301c7ac8698f140b363afd0d34d9ef07f39ba58ab89650bea0d2c6071d290b6f
sssd-polkit-rules-2.9.4-3.el8_10.x86_64.rpm
cbe769d77925a9be210ccc58be3e251eff3f109844fb692c2456793194bcfc99
sssd-proxy-2.9.4-3.el8_10.x86_64.rpm
d1149c5f80a226319c782041317e772c880578c0a81e38214f1c774c76d60f83
sssd-tools-2.9.4-3.el8_10.x86_64.rpm
b43db3ea5e47d033ff76ce4ce286b0f5968e020323c08726aac5f1942166fcf4
sssd-winbind-idmap-2.9.4-3.el8_10.x86_64.rpm
be9f207bc3d487042e05431c7746ef040c5670ba03374ffd4dfbdd4f953bcb52
RLSA-2024:3271
Important: bind and dhcp security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
* bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
Bug Fix:
* dhcp rebuilt after API change of bind-export-libs
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dhcp, bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
* bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
Bug Fix:
* dhcp rebuilt after API change of bind-export-libs
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bind-export-devel-9.11.36-14.el8_10.x86_64.rpm
4d50c99ea9bfc1f02fb0a58e0041547c5a0f14569c17e92842cad1f2a4444508
bind-export-libs-9.11.36-14.el8_10.x86_64.rpm
d1a3cac5a8608be38a84fa8247a9d773ec0e8c8f9336255a8d370cbe0c777fb4
dhcp-client-4.3.6-50.el8_10.x86_64.rpm
4dd3a73a37194f7c98114316746ee293e97cb67343812c6027933bac7b95af50
dhcp-common-4.3.6-50.el8_10.noarch.rpm
8c253b3afeaff236bdb93edc0a90444a1c27ad8c2bf70b950edacc1a0fdd2ed2
dhcp-libs-4.3.6-50.el8_10.x86_64.rpm
921a9549260868d455383141f654bf8c8004c38cf55c11c3977d1284f14c6128
dhcp-relay-4.3.6-50.el8_10.x86_64.rpm
22902c3ab149dcab32a0116f5b53d811decfe7e4a78092078f26e25c78c4c536
dhcp-server-4.3.6-50.el8_10.x86_64.rpm
6c4e704ad59a50bda662125ca4cc2aa634c2204edf17b28823646826953f1fb0
RLBA-2024:3272
gcc bug fix update
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es):
* Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es):
* Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426)
rocky-linux-8-x86-64-baseos-rpms
libasan-8.5.0-22.el8_10.x86_64.rpm
2372b311e2c2c7d05b31acf222d31b482f5f03c2d2fbb343c78dd42eb7b3b8b2
libatomic-8.5.0-22.el8_10.x86_64.rpm
b360b7a09fd21ce658b2a58a6cdb97207b1652cd0fe4b65978522e9a3fbf3aa2
libatomic-static-8.5.0-22.el8_10.x86_64.rpm
9ebfe3c86cf5b42d3ec1ca9909bba725e14e0237a250a1ae9241c7c9e4aefc53
libgcc-8.5.0-22.el8_10.x86_64.rpm
76e67564d1525df82a1cf9b3a586af925e5b2f42a301efbffeeae11603d8653b
libgfortran-8.5.0-22.el8_10.x86_64.rpm
f51baa831faa755587661163522a901ba1a930ff4b056141e96fbafc64b427ba
libgomp-8.5.0-22.el8_10.x86_64.rpm
b3e258c82abe4fbd2dc16abd1787b48aedae765db431873841eb1271beff99cb
libgomp-offload-nvptx-8.5.0-22.el8_10.x86_64.rpm
6f1f55e3e67b44480abf4d7af86c9b1a7aaa20604b7ea18bb299edd358f36967
libitm-8.5.0-22.el8_10.x86_64.rpm
8a1899a53e0d7e2c68965ad55f4e10f26477189f69ca95a62531db4f1316d779
liblsan-8.5.0-22.el8_10.x86_64.rpm
589acae8c67bec6bbf3debe7d8bc669c1e572a33d7f45a02d7755d75b0cba796
libquadmath-8.5.0-22.el8_10.x86_64.rpm
3e7a03604c72a0f3a1aae5945f1df09b713de2a8468f3b15c5fb176507243f88
libstdc++-8.5.0-22.el8_10.x86_64.rpm
8c492a58370c114af1cd4fa71f8ba3b833e1e6bc2090dce47aacfac8f39e7a58
libtsan-8.5.0-22.el8_10.x86_64.rpm
2bde02f76dad739bf8d8ef4a176411963500999fc557b2760f22a02a2cdceb23
libubsan-8.5.0-22.el8_10.x86_64.rpm
5bbb3b681a72576cae5cf61bce8aee8b7c2edabd72512367dfc167aa7afd32df
RLBA-2024:3274
sos update
Please update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Please update
rocky-linux-8-x86-64-baseos-rpms
sos-4.7.1-2.el8_10.noarch.rpm
abd068e760a11dfa4968b09a736df74a1a67510cb8190dde5dad95474f021197
sos-audit-4.7.1-2.el8_10.noarch.rpm
bd4ed92df408c921494faacbcbe20eab0af05319266eeea393440ec623e767d7
RLSA-2024:3275
Moderate: python-dns security update
The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode.
Security Fix(es):
* dnspython: denial of service in stub resolver (CVE-2023-29483)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-dns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode.
Security Fix(es):
* dnspython: denial of service in stub resolver (CVE-2023-29483)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-dns-1.15.0-12.el8_10.noarch.rpm
952b915ac9bf76ace65688631e26438c6d7fde8ea327b12aa7aebdf3ca6767b8
RLSA-2024:3341
Moderate: gdk-pixbuf2 security update
The gdk-pixbuf2 packages provide an image loading library that can be extended
by loadable modules for new image formats. It is used by toolkits such as GTK+
or clutter.
Security Fix(es):
* gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended
by loadable modules for new image formats. It is used by toolkits such as GTK+
or clutter.
Security Fix(es):
* gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
gdk-pixbuf2-2.36.12-6.el8_10.x86_64.rpm
e7cbc96f901e71e76e6b55ad5fc30c1ce83f7af855d41ad983237acf75c502c5
RLSA-2024:3344
Important: glibc security update
The glibc packages provide the standard C libraries (libc), POSIX thread
libraries (libpthread), standard math libraries (libm), and the name service
cache daemon (nscd) used by multiple programs on the system. Without these
libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599)
* glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread
libraries (libpthread), standard math libraries (libm), and the name service
cache daemon (nscd) used by multiple programs on the system. Without these
libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599)
* glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
glibc-2.28-251.el8_10.2.x86_64.rpm
5f9dee73acb40bc44f9e30c9798549fe58aa76aed614a844187b5075e4db4304
glibc-all-langpacks-2.28-251.el8_10.2.x86_64.rpm
2b7dfafee58b2672940b0e4ddaaf319f5797a06ed407a8c1f28e8420a065badb
glibc-common-2.28-251.el8_10.2.x86_64.rpm
51acbbeb9f97dbc9afeae0f8fe51f5e41c91ef33441a5a1d31410638c34fa657
glibc-devel-2.28-251.el8_10.2.x86_64.rpm
93c3eac9db417548298b90449dc69be3410136d8ccef59ffa996ad690ebd2b16
glibc-doc-2.28-251.el8_10.2.noarch.rpm
8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53
glibc-gconv-extra-2.28-251.el8_10.2.x86_64.rpm
890e73820ba5355f7d55020f63fe11d3dde628eaf4227dee344f2c3b6e857e5a
glibc-headers-2.28-251.el8_10.2.x86_64.rpm
7d6743a8dbbea1181218ef247608124d77dee6cac82031bb7fe3ec4f5e04a28a
glibc-langpack-aa-2.28-251.el8_10.2.x86_64.rpm
678bc555973e19d3ea769af140a21f0a7576458dc02c48a3b64ed72da1dd7e32
glibc-langpack-af-2.28-251.el8_10.2.x86_64.rpm
00c1d27d1a5749eea68a51e0f67602496fa5f3f442b85f6a1a826a6c46f64807
glibc-langpack-agr-2.28-251.el8_10.2.x86_64.rpm
7d575d87e04d8f22de7daf7824efb5d1163d5f0fccaddd10975736df9b76d878
glibc-langpack-ak-2.28-251.el8_10.2.x86_64.rpm
731d5b965205efb67eb1e48b7e76b84202c88874e2cdad1d66f66a8fbc497a2e
glibc-langpack-am-2.28-251.el8_10.2.x86_64.rpm
358d6731c5b4dbd2764782afb3cd7ff56a6854d700e8d6a985c93f6732f73f66
glibc-langpack-an-2.28-251.el8_10.2.x86_64.rpm
69954eb1ffb5fe5db98e053287b3c013ea88948eb7da52c8d11675b849c919cf
glibc-langpack-anp-2.28-251.el8_10.2.x86_64.rpm
7e429c3e27157fa104f7186f9b103117d48dc325cff420f2a7a490eda09f9064
glibc-langpack-ar-2.28-251.el8_10.2.x86_64.rpm
4cdcd6389a4b7a0c102b44787846eba902740f90d1eb93b771045c2f76f36063
glibc-langpack-as-2.28-251.el8_10.2.x86_64.rpm
22dd94c0ad3bba6f082d1519c25af6e81494751e11c9699cdca083bc20a2ad51
glibc-langpack-ast-2.28-251.el8_10.2.x86_64.rpm
792a7394d99296b91ea7f57eca97c2677708022e25be9a7c449e7ed44ab98472
glibc-langpack-ayc-2.28-251.el8_10.2.x86_64.rpm
e5e2695a09b5ddd925caff590df6d514920c30e5ba0b513bc2ee549b0f8910ec
glibc-langpack-az-2.28-251.el8_10.2.x86_64.rpm
c8d7fb8b1c43ed290cdf420627db251fa9aaf10bf737676aadf7d76bb02ca7b0
glibc-langpack-be-2.28-251.el8_10.2.x86_64.rpm
82386a29f77623edb58f17e8e205eab173dd83d0efbdf10dcc724f18a142a46c
glibc-langpack-bem-2.28-251.el8_10.2.x86_64.rpm
03cf8e781a5715aa80dc6d7a124f83267baf70b47066f1a63b50c2792fe147be
glibc-langpack-ber-2.28-251.el8_10.2.x86_64.rpm
073287b7918809d1d3c68f8c973aba66f535c93e5d46ca183399d4f679b7a7df
glibc-langpack-bg-2.28-251.el8_10.2.x86_64.rpm
8635f78096f91103fe6ff0e76791477ae615fda3947b9cdec41d01b418fac802
glibc-langpack-bhb-2.28-251.el8_10.2.x86_64.rpm
2dfde722f24cd75029ffd26bba8223a330224849985ef2ec3318d6629793ad24
glibc-langpack-bho-2.28-251.el8_10.2.x86_64.rpm
d0be0055537fa1ac40d80b887a49323d8319669912589e6f4aa2b2d1f1f80823
glibc-langpack-bi-2.28-251.el8_10.2.x86_64.rpm
d7af1f7358f59daa54cb63c026d155d089af7002bff539e8338428a577910a50
glibc-langpack-bn-2.28-251.el8_10.2.x86_64.rpm
e71c0edab89074f318267dd37591fef8fa8d7d30236db5fc1642b8b591066ff2
glibc-langpack-bo-2.28-251.el8_10.2.x86_64.rpm
0c379783e6d387f8590f339d799288a8fb67b08d9493ae2616ebb3297b1fe8ac
glibc-langpack-br-2.28-251.el8_10.2.x86_64.rpm
31c0c28bd287ebbc4b5d4d1fbb1d302cd9a471161717efc6fc3b01a7664287d9
glibc-langpack-brx-2.28-251.el8_10.2.x86_64.rpm
c568de193c0807af757d835d91a988a89e44b3e04bef73a82073d5934727979e
glibc-langpack-bs-2.28-251.el8_10.2.x86_64.rpm
f543df498a7e63c8f8b55025aaa8b3b3aa0af098eeeb49fa151e899be622f5a0
glibc-langpack-byn-2.28-251.el8_10.2.x86_64.rpm
f8fce0af3e0eb179f7341420495a18749d2443c9e8c11aae500d1e5ed70224f4
glibc-langpack-ca-2.28-251.el8_10.2.x86_64.rpm
745ba708a40f5a93d603a60fb50fc194f4fcd115fb4df2df10b5b6a638293c58
glibc-langpack-ce-2.28-251.el8_10.2.x86_64.rpm
59aad0c3adbaca6433df9e570b0f3bf5206592abb8a2fdf006e4407f952563b6
glibc-langpack-chr-2.28-251.el8_10.2.x86_64.rpm
67201e83a0ade666dc3c35f8de0ac8a8b7cff06820533a7840b62a282f08f7f9
glibc-langpack-cmn-2.28-251.el8_10.2.x86_64.rpm
976dcbb8cb8c547ffa0eaaae09e5f6e126748900d29a46f9e34a4073fb7c19ab
glibc-langpack-crh-2.28-251.el8_10.2.x86_64.rpm
d41a8e229513b1648336206fdfcae7fa14b37aaa35157ddc21f6e2fb56c7e74b
glibc-langpack-cs-2.28-251.el8_10.2.x86_64.rpm
e0ad588a5059b295dc0b0db39289392b8c4b0bf989dc535f63cec515923795d0
glibc-langpack-csb-2.28-251.el8_10.2.x86_64.rpm
079c408e016d0af342385c701fa580640254847378955ae2b64b42eea579adbd
glibc-langpack-cv-2.28-251.el8_10.2.x86_64.rpm
6924b4bf9edfad8bb713820e79b5ae6b7d430fe33fc45970b7d7757e3279c108
glibc-langpack-cy-2.28-251.el8_10.2.x86_64.rpm
7ae8033e698f778a161eadf9ccfa3824667b8937aa6599320229288171d412cc
glibc-langpack-da-2.28-251.el8_10.2.x86_64.rpm
12fddd526e7c4b62bbb30080fd2717d33e2a8039d44618a652f7623db4b438b6
glibc-langpack-de-2.28-251.el8_10.2.x86_64.rpm
1c2f533771c3be155b96e49458e3d693283c714a26a9adbdc2f83fa7fe50495d
glibc-langpack-doi-2.28-251.el8_10.2.x86_64.rpm
e45c09f4b6721fa3315f5d8cbfa0ecc1a50fe02b1c32a0a71f9ed4b32e865693
glibc-langpack-dsb-2.28-251.el8_10.2.x86_64.rpm
3221219511d9ac4cb4972bb02d0a7bc0a93b1356db0dd9c4c00e91bc8fcfd682
glibc-langpack-dv-2.28-251.el8_10.2.x86_64.rpm
a0cfc8bc067cc623dc27f017e991bf6c31faca8f72ec42afbd0b3e4c0af184f6
glibc-langpack-dz-2.28-251.el8_10.2.x86_64.rpm
6b3ceaf5682dbe292ca517f0bf9ff783b6c8724555a6bf00e2794c54ec2c70b9
glibc-langpack-el-2.28-251.el8_10.2.x86_64.rpm
28ed38e7008b49ea51ae74cc8d32d6f7dde6bd1b40dcde55e6f7785e901c595c
glibc-langpack-en-2.28-251.el8_10.2.x86_64.rpm
2d15d11ef45e5ae103a7948524f6b4e1d72fc4c161e375078ff3e501526aecf2
glibc-langpack-eo-2.28-251.el8_10.2.x86_64.rpm
43745e09ad545ce9f092b3f07c5402640d7bc11a28739d914e01685740d9a19b
glibc-langpack-es-2.28-251.el8_10.2.x86_64.rpm
507f3944dc331feba8d74073fff597dc504c4bb849cb585bb8dc50b946fddb85
glibc-langpack-et-2.28-251.el8_10.2.x86_64.rpm
095ec54ceb7c017acf18b54b8b609beccc6d3944801f4fc20b928550cc08b450
glibc-langpack-eu-2.28-251.el8_10.2.x86_64.rpm
02aa6f19a5f096e8ddc4a722e9987f1168e6a8d7f4b42b63eae647ca835b1986
glibc-langpack-fa-2.28-251.el8_10.2.x86_64.rpm
26ef1cfa3bb7f6fad5e1088a725d6cb5c538ab9e006d7560980a9ae6b0ec8438
glibc-langpack-ff-2.28-251.el8_10.2.x86_64.rpm
fa21c2030dfa13ee5e30f48487e0486f981d1340c45463eb27644296334d39f4
glibc-langpack-fi-2.28-251.el8_10.2.x86_64.rpm
8c26534ea2ecb803528fac360d1294be94de958453ea863dd672dacb996bdabb
glibc-langpack-fil-2.28-251.el8_10.2.x86_64.rpm
c57e1b144c9b970b7d28a90446c14b533cb61f2bc3ea19844a3970300b55a74b
glibc-langpack-fo-2.28-251.el8_10.2.x86_64.rpm
383cb74c20f5e1cdcecbe5725dfe78323f7748e246b63e054a0cbc9580bcc5ad
glibc-langpack-fr-2.28-251.el8_10.2.x86_64.rpm
a79b4b5505b207a61cd8fa563d0c394e526dcaf6f177d03bd3efaeaf75f72440
glibc-langpack-fur-2.28-251.el8_10.2.x86_64.rpm
b023bb3b1192a392df3af3ac7c34e325f45e7b762d74ef6e155761bbca182513
glibc-langpack-fy-2.28-251.el8_10.2.x86_64.rpm
e9b37a499075c3f497f5fe468434be09988b78bd7bb1275be33438058f719487
glibc-langpack-ga-2.28-251.el8_10.2.x86_64.rpm
8f79881c318edc8d8426dab4952afa71fa0ee913334523c6a138019d18050e7a
glibc-langpack-gd-2.28-251.el8_10.2.x86_64.rpm
ddb954464578a1ab08c11839fdc87729b64e77d98825972610c5b5c8258ba757
glibc-langpack-gez-2.28-251.el8_10.2.x86_64.rpm
bf61c5ed8af642d9c80d12b812eb28d9cbaccf646b8258bc1dff077728718ad6
glibc-langpack-gl-2.28-251.el8_10.2.x86_64.rpm
1f0b879a2c932a69dae68f2afa3fad4b86edf0e9bd20d89e6b4b1fd1b7700c8f
glibc-langpack-gu-2.28-251.el8_10.2.x86_64.rpm
369146fec93a8a699df6b6e7d88cabdb991583120372beafe5516423c4033cc8
glibc-langpack-gv-2.28-251.el8_10.2.x86_64.rpm
d87bbfd46e3a837e15f72b3145d67312e4ffae9ff02df42bdbed293ba5cdf33c
glibc-langpack-ha-2.28-251.el8_10.2.x86_64.rpm
bb8a77700d4f63b38c9f1cfa03c3eb266d14bdb4983e00297c1a6eba7e78e085
glibc-langpack-hak-2.28-251.el8_10.2.x86_64.rpm
028a64ab550a554f13f2d4e7d5a48ea42e2f49e30062fd71c7d61e5e0df44cd9
glibc-langpack-he-2.28-251.el8_10.2.x86_64.rpm
924332927be6eb3123f138b46eda5d4e75f3813e6628612e9f374f8e3576d5d0
glibc-langpack-hi-2.28-251.el8_10.2.x86_64.rpm
28f9b191b3b92423a451692415347392719f05b940be94a63ed1ccf82c0a113e
glibc-langpack-hif-2.28-251.el8_10.2.x86_64.rpm
4ac49b39ed556f2dc105bcf9fc70dda391d188367959da36dd041ff51e35f5a1
glibc-langpack-hne-2.28-251.el8_10.2.x86_64.rpm
fe41b322e41f6325fd333c603dbbf2eb145749682632f826da3a427e1c429461
glibc-langpack-hr-2.28-251.el8_10.2.x86_64.rpm
549f4fe7a53b40b3db020cce43ea4f690b9095ceaabb91e45da9d029aa5061a2
glibc-langpack-hsb-2.28-251.el8_10.2.x86_64.rpm
f8ec8fe3247b2f76e8dcc84adb53921bf18b188c4a5255e308ca5c0c4b2938c3
glibc-langpack-ht-2.28-251.el8_10.2.x86_64.rpm
d76573de02f63b3cfd96219b403fe3a9bc2ebe797fc9b30d3e5f70ee157fe32f
glibc-langpack-hu-2.28-251.el8_10.2.x86_64.rpm
791f4e4d1bf95ac28599dfa0842bb0630b99365eecd72f11ce49adb9ed848d17
glibc-langpack-hy-2.28-251.el8_10.2.x86_64.rpm
3e9faa93e76752b1d0244b39b902053e449a1f5b483bfca04a29b367b0eed21b
glibc-langpack-ia-2.28-251.el8_10.2.x86_64.rpm
427a67943c925935bf9ffb426883377be8b729e6f9e6475208e8887d998c0379
glibc-langpack-id-2.28-251.el8_10.2.x86_64.rpm
48dd4063c79eca75c2f9a711ca45c836b9711cc1be2c2a5f376ea25b19dc7ef7
glibc-langpack-ig-2.28-251.el8_10.2.x86_64.rpm
5420ec348dcee5c18d891dbdcd01c7d2f40688cffb683451b28f94c575925a3e
glibc-langpack-ik-2.28-251.el8_10.2.x86_64.rpm
8f934a1b52b23274a0c853329d472e5b77a5f817cea22a1c9efd39355f15a573
glibc-langpack-is-2.28-251.el8_10.2.x86_64.rpm
1ae21ae2d5b2168231ad17fdfbc08b0aa86ad723fb8b82c08112a742e1651989
glibc-langpack-it-2.28-251.el8_10.2.x86_64.rpm
bce92f3ce30bbaf64a75164925a72e36389189e33d24fd3dfb06ca676eb73a05
glibc-langpack-iu-2.28-251.el8_10.2.x86_64.rpm
71957c7cc4ea58595ac87d27580b648f86763cc3dee3b91734cc64ac1f99d615
glibc-langpack-ja-2.28-251.el8_10.2.x86_64.rpm
a6b35ef657575f0a61514151fda570f57d8350b151bdde6068453366367a1e48
glibc-langpack-ka-2.28-251.el8_10.2.x86_64.rpm
147b685b5a179f7a4b603d8b9f69f3c88f4c6b843e969981dc6e4e4b4dc5c4b0
glibc-langpack-kab-2.28-251.el8_10.2.x86_64.rpm
74e142ad4472575466c86360fbf98cab1a29667320fb45bc7ed2296fadc3df6f
glibc-langpack-kk-2.28-251.el8_10.2.x86_64.rpm
c065f705098b0a3ce5d55a8fa124d11d8bd427f8bb31385bf141334d5c5e943d
glibc-langpack-kl-2.28-251.el8_10.2.x86_64.rpm
b9981fbb4a6665c60f39c8d89b88644f2c9e8f6ad77f9e634cd19e7d523853e8
glibc-langpack-km-2.28-251.el8_10.2.x86_64.rpm
1f33abafceb005944e31668ccc3cc544398d90a2db773a04ebd143a9484c428a
glibc-langpack-kn-2.28-251.el8_10.2.x86_64.rpm
0493e45cbd6a68e333280e2b1c348a19c98d4e28c07f51062b620c60aa52d8ae
glibc-langpack-ko-2.28-251.el8_10.2.x86_64.rpm
e7542e277eb757c903478e7068cd46d097ed1446ae58a9f9e885f66d5d389c0b
glibc-langpack-kok-2.28-251.el8_10.2.x86_64.rpm
d8cd920473e775b6e38b0777cdad67529b57ddec011218ed8c57285427c68b99
glibc-langpack-ks-2.28-251.el8_10.2.x86_64.rpm
768eb82bece5f0f9533c00e8be8a4a4c460045d2383c9a07536d1230fabde4a7
glibc-langpack-ku-2.28-251.el8_10.2.x86_64.rpm
d35d19485a25a327253ecbf5f418e20657062f4c8140e3ef3735a482c276ff3f
glibc-langpack-kw-2.28-251.el8_10.2.x86_64.rpm
0d3248dfa96b3d88a43086819dc84cb4379cda8a37f770914e905c075ee4b2e5
glibc-langpack-ky-2.28-251.el8_10.2.x86_64.rpm
bdb1ed35128dd6a2fc990940ed0dcae5540f292a3250eb23c01b684b2dd0e907
glibc-langpack-lb-2.28-251.el8_10.2.x86_64.rpm
9d05032ac9c74261cd90944f02365803b97bf04306ec829ca1fe55547a6687af
glibc-langpack-lg-2.28-251.el8_10.2.x86_64.rpm
908b6d437e06bf9ec8cae71481b76cdcb40749ed20d81dbe8077d71ecd0ce8e5
glibc-langpack-li-2.28-251.el8_10.2.x86_64.rpm
5a615049259be94a6246a29cfbf60dbce5af334a291cca2793dae1ac43ee11b8
glibc-langpack-lij-2.28-251.el8_10.2.x86_64.rpm
2220b48243ffc0a49abf8642794f8a80640632b7ced4b8f4aea4d0618578afb2
glibc-langpack-ln-2.28-251.el8_10.2.x86_64.rpm
28758e4fc60ba8f68e0201fa1057224d6edc80b37e53b73c956859da08a2c800
glibc-langpack-lo-2.28-251.el8_10.2.x86_64.rpm
68e4d975e599253241f04d8508ed822e4301d355a7fcd95ceea90227b35f5600
glibc-langpack-lt-2.28-251.el8_10.2.x86_64.rpm
b6e01840a3ec6c9cbd2b42acf3328f76b16851abd5668ef6d08ed70e6e28e27e
glibc-langpack-lv-2.28-251.el8_10.2.x86_64.rpm
23a80868f5904e8a5a42f5b60f5bc6de5e8776a13a58b286242a35f8b4daf2b0
glibc-langpack-lzh-2.28-251.el8_10.2.x86_64.rpm
8173e2480d780004e440c9d8b0934f3c170a9798b9d002ab19361d6b0b2f7144
glibc-langpack-mag-2.28-251.el8_10.2.x86_64.rpm
33d91e0b6e075cc5d51c7c1070d6c477e058f481b9a3db4fa359aabe6ed6f1de
glibc-langpack-mai-2.28-251.el8_10.2.x86_64.rpm
ae10f7b683c3e62248e9d9ea5b9b2b7a704886e1c807223f62f67e71605f5809
glibc-langpack-mfe-2.28-251.el8_10.2.x86_64.rpm
2e4fc18ac17c9f1689fba44dbb41aadc8af1bc37b4ef807e9a9f9dd4fce865bb
glibc-langpack-mg-2.28-251.el8_10.2.x86_64.rpm
950d1e478a3607869b6dfbd588a5bdbdf9dce443bc916f3e9a1338f00067e482
glibc-langpack-mhr-2.28-251.el8_10.2.x86_64.rpm
aac7bd2bfc6caf7185ba1873caed149ceeffd5a88eb95ec5a6afba1e10131edf
glibc-langpack-mi-2.28-251.el8_10.2.x86_64.rpm
af890640054113ecb1df7854eebff20077fcaf6acc6408e79de92a74d1377672
glibc-langpack-miq-2.28-251.el8_10.2.x86_64.rpm
bd491484308b3a1c098888de25cdb8f96f29221c45abd462a0616f1245cf3a45
glibc-langpack-mjw-2.28-251.el8_10.2.x86_64.rpm
b86fdbe41d7966607aad754e19d044f9fec3b28a0f6c439958856ffebe7e26b0
glibc-langpack-mk-2.28-251.el8_10.2.x86_64.rpm
43471447f330f092544c2fd1e11536369a700dadee7ff3bf0824cdeb66354b26
glibc-langpack-ml-2.28-251.el8_10.2.x86_64.rpm
5dcac47b2ca52d9f1ca08aa3ff55eb1524365ddfcb1390a356470eac3963cf71
glibc-langpack-mn-2.28-251.el8_10.2.x86_64.rpm
b1b20399368b8bb11c26de6e29a0c5b990be5d4c68e20ff12095b00e1b3f886b
glibc-langpack-mni-2.28-251.el8_10.2.x86_64.rpm
b175b810548d2bad4dbcd951e75363c24dfc1a36da7399d09f80a873f5514402
glibc-langpack-mr-2.28-251.el8_10.2.x86_64.rpm
d0a50ded1e2a03c8db17e6a3c83bb642f0e36d6d052465ed0b8f4aafdbcf0cf6
glibc-langpack-ms-2.28-251.el8_10.2.x86_64.rpm
e5012c8946248d344ac414ccf22cdfc0086face7c295d0550eda4bb87d91de49
glibc-langpack-mt-2.28-251.el8_10.2.x86_64.rpm
747aae2236f92e24e11dc0662cc289bfc826fa5fbdbe57bae811ed27ff525106
glibc-langpack-my-2.28-251.el8_10.2.x86_64.rpm
7296d88c18ac9dc14a0773e4bfcb09039170661047b5058e852eb13bee31c392
glibc-langpack-nan-2.28-251.el8_10.2.x86_64.rpm
705dfb5c56df42f641db33559cf7eaa871986c198b84b975d2656adada02c771
glibc-langpack-nb-2.28-251.el8_10.2.x86_64.rpm
7527c8dd4e8f8202525b8f69c32c234152d779311278beaea60b8ae0cb9d4e27
glibc-langpack-nds-2.28-251.el8_10.2.x86_64.rpm
295b9a3eae9f74a63cc09a68c0ca5bf866ca78612d8cd106b619d24560d65932
glibc-langpack-ne-2.28-251.el8_10.2.x86_64.rpm
4ceaf4ba8f06752c9fb33a16054589d08838bfca9568c29056799d2ef48d29dd
glibc-langpack-nhn-2.28-251.el8_10.2.x86_64.rpm
0ccae1034dd3394c31e5033dbeea15d414f2c07bbf47f2586c1faf9941c0a64f
glibc-langpack-niu-2.28-251.el8_10.2.x86_64.rpm
cb506ea508e9968608a08f6bc5538cad4914971a42dd53600c129796867923e3
glibc-langpack-nl-2.28-251.el8_10.2.x86_64.rpm
b4fc5a8c24652b6670e5d3f4fc0b721de4ca99979efc4101775bb75acd683277
glibc-langpack-nn-2.28-251.el8_10.2.x86_64.rpm
28e75248ab4d44967378052d7f0da6da0ba786dfc81248c93a034d2a44b9cd5b
glibc-langpack-nr-2.28-251.el8_10.2.x86_64.rpm
d23b7a51a276159f15bc561b5568b0bc74add4ac784a9dfd16ef7c8ca4b0dac4
glibc-langpack-nso-2.28-251.el8_10.2.x86_64.rpm
781f4c439a106d3de8afba100e4cbb0b03116e14edd249d9ebc6a0d30cc81b9a
glibc-langpack-oc-2.28-251.el8_10.2.x86_64.rpm
bbdd72bf1dd2900e66b026ee7dda7282e32fee9e42960e5f3098fa2af22f658b
glibc-langpack-om-2.28-251.el8_10.2.x86_64.rpm
46f273d10c54a975804a977a3602d6d9dc49e7a11c44b3cee8cf68ed9e8a0294
glibc-langpack-or-2.28-251.el8_10.2.x86_64.rpm
5ab828d0723654fe62457a52ed057d9de53b111cf0146dc411c2be822815cfec
glibc-langpack-os-2.28-251.el8_10.2.x86_64.rpm
c423ae35666d1280e8873492fad823eb0c146f528090e59987b40b28392a3531
glibc-langpack-pa-2.28-251.el8_10.2.x86_64.rpm
8c13af6c2019bc154aa7679a599171812fe72e18db51e159504772228147d472
glibc-langpack-pap-2.28-251.el8_10.2.x86_64.rpm
c9d37e8b81880578fdf608730daa29a687fe8f66e6e2519a3d38ae6776a6fcc9
glibc-langpack-pl-2.28-251.el8_10.2.x86_64.rpm
a98cc53b07a295c4583a78456bae37805117ba2b123a748c90b5b06e1c5452f4
glibc-langpack-ps-2.28-251.el8_10.2.x86_64.rpm
4b1093e6b97cb5d52931ad525cd6694b178f2e6c11d35208240c6a9bd6b02ca4
glibc-langpack-pt-2.28-251.el8_10.2.x86_64.rpm
011e482a92769ed7d041fc53d0ab9bf282a7b4892d56281fc3cc66aee5155edc
glibc-langpack-quz-2.28-251.el8_10.2.x86_64.rpm
e773879e393de3e44eccc55c92634557fddc85d4d69006e4b53a573df1223116
glibc-langpack-raj-2.28-251.el8_10.2.x86_64.rpm
8b762be9b70dcc76596d64c5959df48e66acdc21eccd05a0ab0736c614f46132
glibc-langpack-ro-2.28-251.el8_10.2.x86_64.rpm
c47a02e24700a7f94b7364a23d86b1214b56ebd2f77f74348f95ea11ae3a8777
glibc-langpack-ru-2.28-251.el8_10.2.x86_64.rpm
3396b099397b6b5bdc6437275f95359a842c60806606ae7146687c18ab813342
glibc-langpack-rw-2.28-251.el8_10.2.x86_64.rpm
d8ac12464cd4489adfbd0a794068f4af607738e94011f9b8da606f2bdac2ed56
glibc-langpack-sa-2.28-251.el8_10.2.x86_64.rpm
d70ac66e8bddde59b4994554d41a885d037333c188ad7b99a2f3a388ec32be1e
glibc-langpack-sah-2.28-251.el8_10.2.x86_64.rpm
3d32ae6eb8a62b770ccffac7cdbf35bf28dbd109c0d377f2623a040dc041afe8
glibc-langpack-sat-2.28-251.el8_10.2.x86_64.rpm
2c133dd023815b8c8d2d6583a94cb1095e1113a3ffb6156f4d4ecedee4fb1e13
glibc-langpack-sc-2.28-251.el8_10.2.x86_64.rpm
4cd1c112acb51acff3f9def497dabdf51576c542321a8ee1d9c30e4da3f08a4f
glibc-langpack-sd-2.28-251.el8_10.2.x86_64.rpm
05d1b601387c54908d417c435b4ae51e294eac8b5ac0fc0c7087a7fae4f766ea
glibc-langpack-se-2.28-251.el8_10.2.x86_64.rpm
e92ed74284674a50b700bcf5e6cb01b0d65559e43f3930d2152149e7b161ce62
glibc-langpack-sgs-2.28-251.el8_10.2.x86_64.rpm
c38cf7e2973e3853fb6399fbd350f79e886dae2809c02dbdc3361644bf58421d
glibc-langpack-shn-2.28-251.el8_10.2.x86_64.rpm
d673a586e4b58cacde8334b4e6a76eb47682181f834c8c0d28a3707d53356b12
glibc-langpack-shs-2.28-251.el8_10.2.x86_64.rpm
db693e329a857f455666d50df5a4b9de37a89126da8eb57af0d40b4c58ab9450
glibc-langpack-si-2.28-251.el8_10.2.x86_64.rpm
f7b33c8c4f2a4cf6997da629f9914ccb3648440a836f04c46b1ba93dcc3ac179
glibc-langpack-sid-2.28-251.el8_10.2.x86_64.rpm
d9aba5d855e06fb4dc36686085aefa78b3fd4a9c93056fdd6dd7075b69101488
glibc-langpack-sk-2.28-251.el8_10.2.x86_64.rpm
8c5e06362fc0eaabfc5471faae972c2a529c8f0ecdb9d990de4c8a55e948f121
glibc-langpack-sl-2.28-251.el8_10.2.x86_64.rpm
ab104744522496c3de9ca19e8de5ad83bb42b62e13a05f7a3551c1615d3b858e
glibc-langpack-sm-2.28-251.el8_10.2.x86_64.rpm
c02ea9b2c9be0e6147d85316575e9f3431992de58850c556e0fb4e2acde662f9
glibc-langpack-so-2.28-251.el8_10.2.x86_64.rpm
29215a4a5e972a549301f0bc220b886e3df90c09302820198e01e94b9f6b4be0
glibc-langpack-sq-2.28-251.el8_10.2.x86_64.rpm
62c500e321ab48620d8adaa0bca22deb1de0e0714b7e9578261c1acadfce46aa
glibc-langpack-sr-2.28-251.el8_10.2.x86_64.rpm
deea0caaeb473645b5d271a396d93be600993e9a7a08a3701a0a3441c46e0117
glibc-langpack-ss-2.28-251.el8_10.2.x86_64.rpm
537059d5672e5eac8f3da47b65fffdb09adce3a4722d027bbdc29d3f4ce95687
glibc-langpack-st-2.28-251.el8_10.2.x86_64.rpm
aee36035bde544c10eb8e76a70a7f7b35071827eb6ced0a2b8d9d1a157c1d4f5
glibc-langpack-sv-2.28-251.el8_10.2.x86_64.rpm
8521e9fbaa659cbec4ba16807bb8d2390016a6db6b412163f5b404bf8113eae6
glibc-langpack-sw-2.28-251.el8_10.2.x86_64.rpm
630948481031095547ccc8350f4f1d5c637e548981eae0c21069de1b17af7255
glibc-langpack-szl-2.28-251.el8_10.2.x86_64.rpm
f071a52d156069b162b9aaddf515c6811ef36192d11b48d87df62b4f6f4912bc
glibc-langpack-ta-2.28-251.el8_10.2.x86_64.rpm
1d2c33dc8bae67ac2c92a635165b4f58f3ec1f60fa5ab6e3f23c0f3f7626df3a
glibc-langpack-tcy-2.28-251.el8_10.2.x86_64.rpm
66de27da791d3cd480a6a4e2a502bec8e5d19ec24070681129dc5d67b4add03b
glibc-langpack-te-2.28-251.el8_10.2.x86_64.rpm
00a0baee255c77d91758370b7b4b5287334ca66234ef7d16f4687b86723cbb1c
glibc-langpack-tg-2.28-251.el8_10.2.x86_64.rpm
a50b77000337ed72da1264b1c161c5ceb74807511cac386aa3dfa314e194780d
glibc-langpack-th-2.28-251.el8_10.2.x86_64.rpm
f0529acbed431c935e36c46e7f14d769ff4c804e1d9e8f7acd5eb526cc5a891e
glibc-langpack-the-2.28-251.el8_10.2.x86_64.rpm
1517674368390397f426f0ea3c67fd7a8b251e79131b93d034f60739b30eb315
glibc-langpack-ti-2.28-251.el8_10.2.x86_64.rpm
25dc398ef197302d27eadf28d6339752ea8bb6ed237f71fcca8e03f335af294b
glibc-langpack-tig-2.28-251.el8_10.2.x86_64.rpm
77b0c9e8df2fd1b7cdd85fe0271064940d0711f097edbf057d1c6b1e09127ff0
glibc-langpack-tk-2.28-251.el8_10.2.x86_64.rpm
10319835967e2381b17bb23f132cd09df070aff64b6ccf42c3e1511a346474c0
glibc-langpack-tl-2.28-251.el8_10.2.x86_64.rpm
e633cb27568417dea243f96fce7531acb2a057e5eb461cb5c589e493181fb609
glibc-langpack-tn-2.28-251.el8_10.2.x86_64.rpm
f14e289acb068e8fb14afe956b665e7a78efedc3c3a79390b7af72570aec69b5
glibc-langpack-to-2.28-251.el8_10.2.x86_64.rpm
4c303c213849884535e6b24d3a5944b52b16f505325520eb01870848907532eb
glibc-langpack-tpi-2.28-251.el8_10.2.x86_64.rpm
f07271a40f66f69a5c0b9bddbdae234b16044bfa42413e5497d62b24d330732e
glibc-langpack-tr-2.28-251.el8_10.2.x86_64.rpm
4f9f044d198b92e22e7aae0d90f4f65d2b5417a9271b7517bb7e3674363eb79f
glibc-langpack-ts-2.28-251.el8_10.2.x86_64.rpm
0a9fba890241d5b086f896cdaa8bc0f2d0dc1da87caa812b2664a84f130e45cf
glibc-langpack-tt-2.28-251.el8_10.2.x86_64.rpm
f9c99dc8fa89d297fdec0ae9b5d60602fa65271883c15382e270c240d6a0c13e
glibc-langpack-ug-2.28-251.el8_10.2.x86_64.rpm
cd11199feb747051a9ea0aeeb2629262ef1f965b8915686edf2973b69593f793
glibc-langpack-uk-2.28-251.el8_10.2.x86_64.rpm
92f51fabd69cf01d3b696b78388944263cd9f2fd6d5062b1f16db67c5b5ae94c
glibc-langpack-unm-2.28-251.el8_10.2.x86_64.rpm
fabeb82cba4a63dff23e3a7e1083c3372843fa2e4fb2534cdc6a2c8e90822b8f
glibc-langpack-ur-2.28-251.el8_10.2.x86_64.rpm
af9f61592cdeb78896cf3e95c20d7eea922b8d092c725532b44dfbc7ee582529
glibc-langpack-uz-2.28-251.el8_10.2.x86_64.rpm
50dfea55cab019da3dc21168467a19ab6d1b8d976c0e220a3da929299808550a
glibc-langpack-ve-2.28-251.el8_10.2.x86_64.rpm
12b6e812b0c0c796f3f8ff8194a9df5677664da25c19163591153844a72290b5
glibc-langpack-vi-2.28-251.el8_10.2.x86_64.rpm
20146d89efcf2a36e21fef1e628ddb0cd2ff33082b07259bad40a7db3fae3392
glibc-langpack-wa-2.28-251.el8_10.2.x86_64.rpm
f2ee3a8091f0189a52546dc5cadc1cb1efc899f543a787955ba1733395444752
glibc-langpack-wae-2.28-251.el8_10.2.x86_64.rpm
946d7b57c6e4f7f4e3ae73fc20376596fc94b18129cb5073e9c4f90f8caacfcf
glibc-langpack-wal-2.28-251.el8_10.2.x86_64.rpm
1eb5b6015736980bb1f4ae258e16c2f55ffef01ca8209b80120f2ec653f2f2cd
glibc-langpack-wo-2.28-251.el8_10.2.x86_64.rpm
9ef3aa0b287da6d7259426c1bfaf02c6f9877d9e7161bdd39cade8fa35ea2926
glibc-langpack-xh-2.28-251.el8_10.2.x86_64.rpm
e72906723e1db0f1925e77902a0bcb24201dda197cb61ce56fa706402195048a
glibc-langpack-yi-2.28-251.el8_10.2.x86_64.rpm
de41a93b98e40d1490c146487ca67c35341eb1bda3d3eb2ed48d5c34a02ea4e8
glibc-langpack-yo-2.28-251.el8_10.2.x86_64.rpm
84640a518171eac4f3238500a63d21e8afe41b2cb9ef39cd5f81d50bc65290b3
glibc-langpack-yue-2.28-251.el8_10.2.x86_64.rpm
3647320bcaa3ecdb308852d5eae3c2a58ce346d4706ed05315245bdcbb1041cb
glibc-langpack-yuw-2.28-251.el8_10.2.x86_64.rpm
15f5c0455c5ebc565b1b55903b897664b04af020a06a0f04a5af9fe9933db2d0
glibc-langpack-zh-2.28-251.el8_10.2.x86_64.rpm
9b95cf02bfe604019d0e89a00bcd87b0545dc3d939674e928ca8e1f79b40b58c
glibc-langpack-zu-2.28-251.el8_10.2.x86_64.rpm
35575ee72fe54d0dafb11b2110cc9a081d2a1ffa2959f8480894ba8845495112
glibc-locale-source-2.28-251.el8_10.2.x86_64.rpm
19a07e625196363d6ba81eea384357f812b4c2b73d194cff47d8cdacb5920909
glibc-minimal-langpack-2.28-251.el8_10.2.x86_64.rpm
90510c6fcf5524985073971cf42c731b0b3bf2f6680e26cad763d8711df9e63b
libnsl-2.28-251.el8_10.2.x86_64.rpm
d2d8fb740919f57a31c5777162d24756bfc1c9012d83473f9272155bbb974dc3
nscd-2.28-251.el8_10.2.x86_64.rpm
2d16aa6ff80372dbfd8061b0e5e243d04d64c1309f5b0362a27438fc9f01254b
nss_db-2.28-251.el8_10.2.x86_64.rpm
042c11844b92847f0e672eb3902f56577e075dd8b286597b2769b4bf701e1deb
RLSA-2024:3347
Important: python3 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-62.el8_10.rocky.0.x86_64.rpm
3ea554540aaa32f04d37c1b0a29689bdcfefaa1c9e7aef0ad1a05e7eea463219
python3-libs-3.6.8-62.el8_10.rocky.0.x86_64.rpm
2cfea010988b1951785cd484bf3f68df04cdd9f3a8a9c81dd23cc9a47057da0b
python3-test-3.6.8-62.el8_10.rocky.0.x86_64.rpm
d6f24fc049141ddaebe1ff4fefa44a731c3014f36628ffae0b94dd9eb6f25100
RLBA-2024:3358
polkit bug fix update
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Bug Fix(es):
* polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for polkit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Bug Fix(es):
* polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029)
rocky-linux-8-x86-64-baseos-rpms
polkit-0.115-15.el8_10.2.x86_64.rpm
1e822fbe657459ab3ecd59f75e64d5c6ea24704fd7449ac5d16eee7b02e263ff
polkit-devel-0.115-15.el8_10.2.x86_64.rpm
ab702408ac9d8700f7abc9022fcf648df1db54b3362ee819855e6e0f3c70679d
polkit-docs-0.115-15.el8_10.2.noarch.rpm
24198bd5b8ce86b4b06e4f7d605ff3f65ed8d00ee21643881b35af87ee6428dc
polkit-libs-0.115-15.el8_10.2.x86_64.rpm
b8f2c1c148f056e78a0a7c2b34a26205fa0715bfe041a694fcb28c74f0837f12
RLBA-2024:3381
tuned bug fix update
The tuned packages provide a service that tunes system settings according to a selected profile.
Bug Fix(es):
* tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Bug Fix(es):
* tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124)
rocky-linux-8-x86-64-baseos-rpms
tuned-2.22.1-4.el8_10.1.noarch.rpm
f900b6cd20f9e14d8364dd0dd82db34a638762d469423dd02ab633d238997e13
tuned-profiles-atomic-2.22.1-4.el8_10.1.noarch.rpm
9b1b3d5f313c2af1ad180eeaa9e964444e4059a143cea35964fe88319a4b0ad5
tuned-profiles-compat-2.22.1-4.el8_10.1.noarch.rpm
66d03ce05980bd92d0890ffbcc1220685127addd1b3e24fd73535313ce362201
tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.1.noarch.rpm
0166597a16e1976563c2ee53be27ba16649091e3ab92d4b24160e1c8a841c403
tuned-profiles-mssql-2.22.1-4.el8_10.1.noarch.rpm
e0e075ee3e7fd6c871837aa34482590021f94735cee4a1e8d872dec24fbdb777
tuned-profiles-oracle-2.22.1-4.el8_10.1.noarch.rpm
2e949f7758e994826f506e1889ed2caf38be6f24692aa982591be3f15c015c02
RLSA-2024:3618
Moderate: kernel update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Marvin vulnerability side-channel leakage in the RSA decryption
operation (CVE-2023-6240)
* kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
(CVE-2024-0340)
* kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744)
* kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)
* kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)
* kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer
that cause loop forever (CVE-2024-26603)
* kernel: use after free in i2c (CVE-2019-25162)
* kernel: i2c: validate user data in compat ioctl (CVE-2021-46934)
* kernel: media: dvbdev: Fix memory leak in dvb_media_device_free()
(CVE-2020-36777)
* kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
(CVE-2023-52477)
* kernel: mtd: require write permissions for locking and badblock ioctls
(CVE-2021-47055)
* kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump
(CVE-2024-26615)
* kernel: vt: fix memory overlapping when deleting chars in the buffer
(CVE-2022-48627)
* kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)
* kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()
(CVE-2023-52565)
* kernel: net: bridge: data races indata-races in br_handle_frame_finish()
(CVE-2023-52578)
* kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
(CVE-2023-52528)
* kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)
* kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)
* kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118)
* kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
(CVE-2023-52610)
* kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set
with timeout (CVE-2024-26643)
* kernel: netfilter: nf_tables: disallow anonymous set with timeout flag
(CVE-2024-26642)
* kernel: i2c: i801: Don't generate an interrupt on bus reset
(CVE-2021-47153)
* kernel: xhci: handle isoc Babble and Buffer Overrun events properly
(CVE-2024-26659)
* kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)
* kernel: wifi: mac80211: fix race condition on enabling fast-xmit
(CVE-2024-26779)
* kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
(CVE-2024-26744)
* kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)
* kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
(CVE-2021-47185)
* kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
(CVE-2024-26901)
* kernel: RDMA/srpt: Do not register event handler until srpt device is fully
setup (CVE-2024-26872)
* kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919)
* kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)
* kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
(CVE-2024-26934)
* kernel: USB: core: Fix deadlock in port "disable" sysfs attribute
(CVE-2024-26933)
* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
(CVE-2024-26993)
* kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)
* kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
(CVE-2024-27059)
* kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013)
* kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171)
* kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)
* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)
* kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)
* kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Marvin vulnerability side-channel leakage in the RSA decryption
operation (CVE-2023-6240)
* kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
(CVE-2024-0340)
* kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744)
* kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)
* kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)
* kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer
that cause loop forever (CVE-2024-26603)
* kernel: use after free in i2c (CVE-2019-25162)
* kernel: i2c: validate user data in compat ioctl (CVE-2021-46934)
* kernel: media: dvbdev: Fix memory leak in dvb_media_device_free()
(CVE-2020-36777)
* kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
(CVE-2023-52477)
* kernel: mtd: require write permissions for locking and badblock ioctls
(CVE-2021-47055)
* kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump
(CVE-2024-26615)
* kernel: vt: fix memory overlapping when deleting chars in the buffer
(CVE-2022-48627)
* kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)
* kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()
(CVE-2023-52565)
* kernel: net: bridge: data races indata-races in br_handle_frame_finish()
(CVE-2023-52578)
* kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
(CVE-2023-52528)
* kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)
* kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)
* kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118)
* kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
(CVE-2023-52610)
* kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set
with timeout (CVE-2024-26643)
* kernel: netfilter: nf_tables: disallow anonymous set with timeout flag
(CVE-2024-26642)
* kernel: i2c: i801: Don't generate an interrupt on bus reset
(CVE-2021-47153)
* kernel: xhci: handle isoc Babble and Buffer Overrun events properly
(CVE-2024-26659)
* kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)
* kernel: wifi: mac80211: fix race condition on enabling fast-xmit
(CVE-2024-26779)
* kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
(CVE-2024-26744)
* kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)
* kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
(CVE-2021-47185)
* kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
(CVE-2024-26901)
* kernel: RDMA/srpt: Do not register event handler until srpt device is fully
setup (CVE-2024-26872)
* kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919)
* kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)
* kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
(CVE-2024-26934)
* kernel: USB: core: Fix deadlock in port "disable" sysfs attribute
(CVE-2024-26933)
* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
(CVE-2024-26993)
* kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)
* kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
(CVE-2024-27059)
* kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013)
* kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171)
* kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)
* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)
* kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)
* kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.5.1.el8_10.x86_64.rpm
9283c359eae84658351912b95138141f95cac98791ef5a5a476c5515ff49c110
kernel-4.18.0-553.5.1.el8_10.x86_64.rpm
f6f49c9b37c1010d12232ba0697602a4d9fe6d1e32a3b7099aeaecf225f46229
kernel-abi-stablelists-4.18.0-553.5.1.el8_10.noarch.rpm
90980b327ea205a51346967228b957b96581042d62de488c25b7240cfa923a96
kernel-core-4.18.0-553.5.1.el8_10.x86_64.rpm
11563d5171f288fe5e2a93127248ca91f1ee2fdb55d300df7d6b136f50f78f12
kernel-cross-headers-4.18.0-553.5.1.el8_10.x86_64.rpm
b1ed97e3c044f4b7d9a33555eea683075efac8f5afc02861de7760331e7ac2d4
kernel-debug-4.18.0-553.5.1.el8_10.x86_64.rpm
7332fb9229723be35718a21c209ed616a2c1a189033d332d58f3eee993b69de7
kernel-debug-core-4.18.0-553.5.1.el8_10.x86_64.rpm
63bd8d0724d28256040c2af5dabc8a89494202b5e7ebf490acf83191a58ba2eb
kernel-debug-devel-4.18.0-553.5.1.el8_10.x86_64.rpm
2c746e6daa9b093dab3e90739815664c2903f3509b15a1d97c1cf80c8f8f8bbc
kernel-debuginfo-common-x86_64-4.18.0-553.5.1.el8_10.x86_64.rpm
a278a4df77e52d53ec6a99af7472162c4a243b162675cb7b144ccc5c164a94d4
kernel-debug-modules-4.18.0-553.5.1.el8_10.x86_64.rpm
4d9c24fef0cec49e0529eea8134c1123c80c9d3be9fa636c5db69ab1a0de963b
kernel-debug-modules-extra-4.18.0-553.5.1.el8_10.x86_64.rpm
e1443da56289af938308f2f7f562698b79066fbfb0dcf80dd10a7b60c3ec528e
kernel-devel-4.18.0-553.5.1.el8_10.x86_64.rpm
e55f2c2c82b790bc174fd247cd19c54737531d8d7374db91b43968c1311f5c35
kernel-doc-4.18.0-553.5.1.el8_10.noarch.rpm
cd20284242d611eb16894f2de6b0f29b145993ccfea76de1ace9805be0a1390f
kernel-headers-4.18.0-553.5.1.el8_10.x86_64.rpm
d786a322b35ac66d366c76073d2d280b6371cb7288fe71485fb42cf00f3aff73
kernel-modules-4.18.0-553.5.1.el8_10.x86_64.rpm
f25c9913e68bed6807842021ef72ec61747db11e954239e95ea7c8aa4eb4a55a
kernel-modules-extra-4.18.0-553.5.1.el8_10.x86_64.rpm
1ae707f7bdd1baba5370ace933c52e22fb65b2f696635b8a5943d62f22267b69
kernel-tools-4.18.0-553.5.1.el8_10.x86_64.rpm
126b122fef8e81effb46592af76ce729bc533412c3e156e9793edd0f115095ba
kernel-tools-libs-4.18.0-553.5.1.el8_10.x86_64.rpm
89a7f9106d54ce83ca73aea0853d9b404b1887df447cf796b4e6db88aefa2e5b
perf-4.18.0-553.5.1.el8_10.x86_64.rpm
1a856e4547083da670bca6b657608e7230ab87a50f4f4cebf588cc32fd4cb58f
python3-perf-4.18.0-553.5.1.el8_10.x86_64.rpm
e79fc6e975a8cf125815490c0f66d4232fce3509d8b3fa01ef231446d5f805ec
RLSA-2024:3626
Moderate: libxml2 security update
The libxml2 library is a development toolbox providing the implementation of
various XML standards.
Security Fix(es):
* libxml2: use-after-free in XMLReader (CVE-2024-25062)
For more details about the security issue(s), including the impact,
a CVSS score, acknowledgments, and other related information, refer
to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of
various XML standards.
Security Fix(es):
* libxml2: use-after-free in XMLReader (CVE-2024-25062)
For more details about the security issue(s), including the impact,
a CVSS score, acknowledgments, and other related information, refer
to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libxml2-2.9.7-18.el8_10.1.x86_64.rpm
4571f01fdfd33cf1dff725e05e325511f5cf276db1310ff9d93c8f2b7ed35903
python3-libxml2-2.9.7-18.el8_10.1.x86_64.rpm
9f56269fc7cf026e298a1b28e2aeb772de6ffa045815c0c2fb49dbbc8619aca6
RLSA-2024:3667
Moderate: cockpit security update
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
Security Fix(es):
* cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
Security Fix(es):
* cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
cockpit-310.4-1.el8_10.x86_64.rpm
868bf89adef0927f699d23c17268a52f4bb060724b156bc632acecdf2df592a6
cockpit-bridge-310.4-1.el8_10.x86_64.rpm
982caf942ac116095a13666930047fa39f2be073af650cd8397f8af7549420c0
cockpit-doc-310.4-1.el8_10.noarch.rpm
2fc98216866ffe728743849c8bd1e9e876b32579f57c9b8e172bf2da30594393
cockpit-system-310.4-1.el8_10.noarch.rpm
342a2a051327d592f2fcd641aa4ab0426d1b1fa7bd74297208f5ee64a017fa31
cockpit-ws-310.4-1.el8_10.x86_64.rpm
7b3b3078757fcebc9c1c48eb6d98cf1e4afa3b4501cc735fb30277e854e99cd4
RLBA-2024:4049
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104)
* rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106)
* sos clean on an existing archive fails to clean anything (Rocky Linux-35945)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104)
* rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106)
* sos clean on an existing archive fails to clean anything (Rocky Linux-35945)
rocky-linux-8-x86-64-baseos-rpms
sos-4.7.1-3.el8_10.noarch.rpm
9f99fa4998fc4a7fd86109cbf7352835dd81177932336ce2ef4083c4b21369d4
sos-audit-4.7.1-3.el8_10.noarch.rpm
caf87c9a2a6b3179bb70ed0cdc2fe7b38eafd183aa5a37624644c663cf9f1cfc
RLSA-2024:4211
Important: kernel security and bug fix update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)
* kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)
* kernel: ovl: fix leaked entry (CVE-2021-46972)
* kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)
* kernel: gro: fix ownership transfer (CVE-2024-35890)
* kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585)
* kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845)
* kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007)
* kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909)
* kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069)
* kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615)
* kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959)
* kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)
* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801)
* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
* kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397)
* kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)
* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)
* kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906)
* kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700)
* kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)
* kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)
* kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686)
* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)
* kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)
* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
* kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813)
* kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703)
* kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)
* kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835)
* kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495)
* kernel: can: (CVE-2023-52878, CVE-2021-47456)
* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)
* kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)
Bug Fix(es):
* Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783)
* Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361)
* Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048)
* [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130)
* Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195)
* Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)
* kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)
* kernel: ovl: fix leaked entry (CVE-2021-46972)
* kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)
* kernel: gro: fix ownership transfer (CVE-2024-35890)
* kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585)
* kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845)
* kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007)
* kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909)
* kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069)
* kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615)
* kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959)
* kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)
* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801)
* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
* kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397)
* kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)
* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)
* kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906)
* kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700)
* kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)
* kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)
* kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686)
* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)
* kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)
* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
* kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813)
* kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703)
* kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)
* kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835)
* kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495)
* kernel: can: (CVE-2023-52878, CVE-2021-47456)
* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)
* kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)
Bug Fix(es):
* Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783)
* Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361)
* Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048)
* [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130)
* Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195)
* Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.8.1.el8_10.x86_64.rpm
606375b21c32f4e07c75b7d9714ef47765e90b4af8ed613e97c218c18185a2d6
kernel-4.18.0-553.8.1.el8_10.x86_64.rpm
f61e09f7b600996dfafbe97623881f96fd0e73b3bbfce5d458eb474fc48c963d
kernel-abi-stablelists-4.18.0-553.8.1.el8_10.noarch.rpm
ce28a833ec84dd9475cf080053603a0d7ee70408d9b343ecb7798f1d8f45c4ef
kernel-core-4.18.0-553.8.1.el8_10.x86_64.rpm
3bfa44404b018d4f85dbc3697900826e7bacdfcffd6f4b6d8ae322c37dd78ccb
kernel-cross-headers-4.18.0-553.8.1.el8_10.x86_64.rpm
b3d4c8e4b1fa4aabaae13d7c3006576cf5da6e238b8c073cdbcdd8897d7d290e
kernel-debug-4.18.0-553.8.1.el8_10.x86_64.rpm
24fd8e1dbbc095085276a8af3255543a213b8f9cda4a19d3a70410343d3554d8
kernel-debug-core-4.18.0-553.8.1.el8_10.x86_64.rpm
01974ace84deedd0b1f46698194a250f8e765585818f3c1819b607ee810d0e5c
kernel-debug-devel-4.18.0-553.8.1.el8_10.x86_64.rpm
174aaa862669df5120578f762e2f2812bd9985726f54bfdb9d1a2c171a1f9621
kernel-debuginfo-common-x86_64-4.18.0-553.8.1.el8_10.x86_64.rpm
58a7b4ba99a7e28658d5a1bf884d94ad1e2bc3731b6043197fb658a9c5650e39
kernel-debug-modules-4.18.0-553.8.1.el8_10.x86_64.rpm
50b55b72c05b6b75029c555ce30c6547610184fab684f56c68fcfe75b38737f9
kernel-debug-modules-extra-4.18.0-553.8.1.el8_10.x86_64.rpm
aedef7cee239cab7d13522cb2afa6dd09e28283d362f626488db3136a5047e4d
kernel-devel-4.18.0-553.8.1.el8_10.x86_64.rpm
9547eb97b7a62dc25943b8d00f0eb34c3c660522c5a3d7b886b2a3170ea3297a
kernel-doc-4.18.0-553.8.1.el8_10.noarch.rpm
a8717793a235f885bcc55160aa46c8e0b5897f0a3928d19927ceabfefd3b2fb3
kernel-headers-4.18.0-553.8.1.el8_10.x86_64.rpm
02eb8ba976663158f56ef5dc52b0db92dc9419cd02d353621fae3f83e5c20e1f
kernel-modules-4.18.0-553.8.1.el8_10.x86_64.rpm
fc682d78b214cab8b704bc6198e32ae30dfec43816ad54ff575ea3a1dc07b299
kernel-modules-extra-4.18.0-553.8.1.el8_10.x86_64.rpm
192fb778d7f8ada7dac7720e8ee5d8f9f25ed810278f18a3b963ccfd6310cc48
kernel-tools-4.18.0-553.8.1.el8_10.x86_64.rpm
f2b8ec0828f61e5c58d84a07970f58ee358a017854ad6d54c2e5fe18b8c1a644
kernel-tools-libs-4.18.0-553.8.1.el8_10.x86_64.rpm
f03cbbd4ab4270d683189441e22c910085ce6a6624b410838828cbde51ba6dbf
perf-4.18.0-553.8.1.el8_10.x86_64.rpm
bf2d61b09257ac646615360832ab9c0eac016eb1efb6ad91ac5b91e00bd75a42
python3-perf-4.18.0-553.8.1.el8_10.x86_64.rpm
89731e7753b4d52e508102bf4195c82cbd82808b2ad96f0a3d1c3ba82412e247
RLSA-2024:4620
Important: libndp security update
Libndp is a library (used by NetworkManager) that provides a wrapper for the IPv6 Neighbor Discovery Protocol. It also provides a tool named ndptool for sending and receiving NDP messages.
Security Fix(es):
* libndp: buffer overflow in route information length field (CVE-2024-5564)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libndp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libndp is a library (used by NetworkManager) that provides a wrapper for the IPv6 Neighbor Discovery Protocol. It also provides a tool named ndptool for sending and receiving NDP messages.
Security Fix(es):
* libndp: buffer overflow in route information length field (CVE-2024-5564)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libndp-1.7-7.el8_10.x86_64.rpm
5fada82ce2a48ba83fe7f140b56ccc3c264fd0ac2409728f03a847692517be2a
RLSA-2024:5101
Important: kernel security update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)
* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
* kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)
* kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)
* kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)
* kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802)
* kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)
* kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)
* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
* kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)
* kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)
* kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
* kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)
* kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)
* kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)
* kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893)
* kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)
* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)
* kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845)
* (CVE-2023-28746)
* (CVE-2023-52847)
* (CVE-2021-47548)
* (CVE-2024-36921)
* (CVE-2024-26921)
* (CVE-2021-47579)
* (CVE-2024-36927)
* (CVE-2024-39276)
* (CVE-2024-33621)
* (CVE-2024-27010)
* (CVE-2024-26960)
* (CVE-2024-38596)
* (CVE-2022-48743)
* (CVE-2024-26733)
* (CVE-2024-26586)
* (CVE-2024-26698)
* (CVE-2023-52619)
Bug Fix(es):
* Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678)
* [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841)
* [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941)
* lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437)
* [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074)
* Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167)
* blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939)
* (JIRA:Rocky Linux-31798)
* (JIRA:Rocky Linux-10263)
* (JIRA:Rocky Linux-40901)
* (JIRA:Rocky Linux-43547)
* (JIRA:Rocky Linux-34876)
Enhancement(s):
* [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)
* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
* kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)
* kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)
* kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)
* kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802)
* kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)
* kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)
* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
* kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)
* kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)
* kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
* kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)
* kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)
* kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)
* kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893)
* kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)
* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)
* kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845)
* (CVE-2023-28746)
* (CVE-2023-52847)
* (CVE-2021-47548)
* (CVE-2024-36921)
* (CVE-2024-26921)
* (CVE-2021-47579)
* (CVE-2024-36927)
* (CVE-2024-39276)
* (CVE-2024-33621)
* (CVE-2024-27010)
* (CVE-2024-26960)
* (CVE-2024-38596)
* (CVE-2022-48743)
* (CVE-2024-26733)
* (CVE-2024-26586)
* (CVE-2024-26698)
* (CVE-2023-52619)
Bug Fix(es):
* Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678)
* [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841)
* [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941)
* lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437)
* [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074)
* Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167)
* blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939)
* (JIRA:Rocky Linux-31798)
* (JIRA:Rocky Linux-10263)
* (JIRA:Rocky Linux-40901)
* (JIRA:Rocky Linux-43547)
* (JIRA:Rocky Linux-34876)
Enhancement(s):
* [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.16.1.el8_10.x86_64.rpm
88c5629b6dcb87552b5d1dcb9a2b6cf734ed252f060d76a8bc5c83ab93bd8bd0
kernel-4.18.0-553.16.1.el8_10.x86_64.rpm
dd95da27c8c913c9609bc92aea741dd20255b6c44b4629e817da5c5260c04652
kernel-abi-stablelists-4.18.0-553.16.1.el8_10.noarch.rpm
dda1de03cb73fb30ba5e07ebf6e6545abaec396b191e59181a82393c773a5b90
kernel-core-4.18.0-553.16.1.el8_10.x86_64.rpm
a5df23f528185f2645d8af7a9476553b2bd08519ce89953ab56316f14b102015
kernel-cross-headers-4.18.0-553.16.1.el8_10.x86_64.rpm
aaab879f8a41d5e02d2552acff8edfa6ca9eb417ddd04d02e0e2394987c5cff4
kernel-debug-4.18.0-553.16.1.el8_10.x86_64.rpm
4ac66a75e1e4a06d3f9bf0393a5807aa42564fb25515558e42c2f468365f11fa
kernel-debug-core-4.18.0-553.16.1.el8_10.x86_64.rpm
8b1212ce372d7254c8eede750eb14b40f40da1b52e5307291a5911ca72b36fdb
kernel-debug-devel-4.18.0-553.16.1.el8_10.x86_64.rpm
7f7ce4dec417e31920f827fedffd5007f9dd27b2eb2751c780653edbb72095e3
kernel-debuginfo-common-x86_64-4.18.0-553.16.1.el8_10.x86_64.rpm
160102db22b007ad0cef1902b756075546aceff75028d3116114ea64310bc6d2
kernel-debug-modules-4.18.0-553.16.1.el8_10.x86_64.rpm
56307b98c9a2e2258fce487c4e9085bee977719928438090a7cca9925d74cbca
kernel-debug-modules-extra-4.18.0-553.16.1.el8_10.x86_64.rpm
4ec620c0dee99307e769a7d18625010941984bcd64e2200465702abbc5cf4fc5
kernel-devel-4.18.0-553.16.1.el8_10.x86_64.rpm
7a52fd72d31935c571b0e4c6bb9763ef2267c234f16848ce5a093cbcd7a16692
kernel-doc-4.18.0-553.16.1.el8_10.noarch.rpm
8fb650a74d20d34146b9a685185018288e5afb32478ff15368b5d1336207ce4a
kernel-headers-4.18.0-553.16.1.el8_10.x86_64.rpm
d4d6c494899ef37f9c9f2ce678f97ea1b8590ec8db8f17d5181e3d53d1446a5c
kernel-modules-4.18.0-553.16.1.el8_10.x86_64.rpm
d5ee283085de022d9bc248a1a5584a8838b4b6d18f84a945954592f47c8c990a
kernel-modules-extra-4.18.0-553.16.1.el8_10.x86_64.rpm
acb93dd835e10e39f109bcf3a3ec692dcf049bd5bd963f4c0824afa05f69baf4
kernel-tools-4.18.0-553.16.1.el8_10.x86_64.rpm
41929c71e5547b0241d6017a6904c1efe4c9f4d2157c6a20e2ab0bb995da104b
kernel-tools-libs-4.18.0-553.16.1.el8_10.x86_64.rpm
6b0538aaed36f7509bcd9b54e184fd940a0885170b54e5707b74bb7abb1c7fb9
perf-4.18.0-553.16.1.el8_10.x86_64.rpm
4c7c3d45526372f400f3acbaf9d3eac34672ccf1c56147d02f5e96cc68b45f2b
python3-perf-4.18.0-553.16.1.el8_10.x86_64.rpm
2fe4228c21c03477c61905c69d557ed34421c3117546576ea683e359ba2c099c
RLSA-2024:5530
Important: python-setuptools security update
The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python-setuptools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-setuptools-39.2.0-8.el8_10.noarch.rpm
1d939bb64adcd70c11c2dba4da66d123036ba303719fab3d2e6b0b1f742efd7e
python3-setuptools-39.2.0-8.el8_10.noarch.rpm
bcb685f02a8d2bfeed90454e42b001cffae87ef80c1572822cbb769fe8092bbc
python3-setuptools-wheel-39.2.0-8.el8_10.noarch.rpm
bac06e301b93b49d498016a0cf652ee297826f034db5ddb288df1834b48a5b9a
RLBA-2024:5915
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* [rebase] rebase sos to 4.7.2 in Rocky Linux8.10 (JIRA:Rocky Linux-49779)
* sos report dracut module takes 100s when using rpm-ostree (JIRA:Rocky Linux-33703)
* Capture the output of 'tunegfs2' for GFS2 filesystems. (JIRA:Rocky Linux-40871)
* [rebase] rebase sos to 4.7.2 in Rocky Linux9.4 (JIRA:Rocky Linux-49781)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* [rebase] rebase sos to 4.7.2 in Rocky Linux8.10 (JIRA:Rocky Linux-49779)
* sos report dracut module takes 100s when using rpm-ostree (JIRA:Rocky Linux-33703)
* Capture the output of 'tunegfs2' for GFS2 filesystems. (JIRA:Rocky Linux-40871)
* [rebase] rebase sos to 4.7.2 in Rocky Linux9.4 (JIRA:Rocky Linux-49781)
rocky-linux-8-x86-64-baseos-rpms
sos-4.7.2-2.el8_10.noarch.rpm
0526fdfbcaf20373a0925fbe826d750203c0ea7cb6fbdc894a3e519c8f7e20ec
sos-audit-4.7.2-2.el8_10.noarch.rpm
602d86eca0007b964acc1593de700af8757d63fd018fc37a405d8c5bbb95f69a
RLSA-2024:6422
Important: bubblewrap and flatpak security update
Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces.
Security Fix(es):
* flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for flatpak, bubblewrap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces.
Security Fix(es):
* flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bubblewrap-0.4.0-2.el8_10.x86_64.rpm
2899b655f4be66eac7534acc35858209ac1a0be12117a95aa8294ad4f14bce75
RLSA-2024:6975
Moderate: python3 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032)
* cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032)
* cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-67.el8_10.rocky.0.x86_64.rpm
df9f7d5ddb4a271feac50bbda594c56a0785732abe4eeac884cf62a4b6fb5e65
python3-libs-3.6.8-67.el8_10.rocky.0.x86_64.rpm
3905e8ea0de4870168d799d765bf122e5138ef6330041cc638c3253b89e196f3
python3-test-3.6.8-67.el8_10.rocky.0.x86_64.rpm
9a35e692159325f6482e6206f091092b6f7d9c5f7489dbe4994fcec809965f88
RLBA-2024:6976
findutils bug fix update
The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments.
Bug Fix(es):
* findutils-4.9.0-8.el10: Rocky Linux SAST Automation: address 1 High impact true positive(s) [rhel-8.10.z] (JIRA:Rocky Linux-45720)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for findutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments.
Bug Fix(es):
* findutils-4.9.0-8.el10: Rocky Linux SAST Automation: address 1 High impact true positive(s) [rhel-8.10.z] (JIRA:Rocky Linux-45720)
rocky-linux-8-x86-64-baseos-rpms
findutils-4.6.0-23.el8_10.x86_64.rpm
c9493548ff0e51d8db2ee1969f4ad8e3d774426a5314294d5c0f252509c7d0c8
RLBA-2024:6977
systemd bug fix update
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* [spec] do not create symlink /etc/systemd/system/syslog.service (JIRA:Rocky Linux-13179)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* [spec] do not create symlink /etc/systemd/system/syslog.service (JIRA:Rocky Linux-13179)
rocky-linux-8-x86-64-baseos-rpms
systemd-239-82.el8_10.2.x86_64.rpm
26044bf586d7458dc417434d6bf1951366daedf1ed510eecbe738729c3dbaafc
systemd-container-239-82.el8_10.2.x86_64.rpm
59c0d8d4a65baf9e72d3366fbfc872685fa1c30ec27de2e15a9fd5bb6f4e99dc
systemd-devel-239-82.el8_10.2.x86_64.rpm
d4a578456394dd2e064ad72f3ba2a3348002e55635a7ab3e430d528c2f673004
systemd-journal-remote-239-82.el8_10.2.x86_64.rpm
bf0b9c83da129a4e25c52b0071410375b1acceadc3474030fcb5714d0e3c13fe
systemd-libs-239-82.el8_10.2.x86_64.rpm
401eee3af67df2147d64f527f0b3284ed49586ececa343af205a04c042acd015
systemd-pam-239-82.el8_10.2.x86_64.rpm
6f38bd9aa546dcf6932dc54ad7dffc2273cf2ca8b5aa3065dec490831ff72417
systemd-tests-239-82.el8_10.2.x86_64.rpm
b98f03f1e93a33522573289e5ee7fe8de2212afb4ca2c8c98a8f0b8b525ccfe2
systemd-udev-239-82.el8_10.2.x86_64.rpm
27ab1eb0e04c31403ca52023518ef31397a48541551ec33e43887923e06b0b0c
RLBA-2024:6980
kexec-tools bug fix update
The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel.
Bug Fix(es):
* The dracut-module-setup.sh interface renaming regex is not accurate (JIRA:Rocky Linux-47130)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel.
Bug Fix(es):
* The dracut-module-setup.sh interface renaming regex is not accurate (JIRA:Rocky Linux-47130)
rocky-linux-8-x86-64-baseos-rpms
kexec-tools-2.0.26-14.el8_10.2.x86_64.rpm
6169d07b5306a18c6ce043f07aaabdf730987de703ce18531b47afce0edc0935
RLBA-2024:6981
libldb bug fix update
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
Bug Fix(es):
* libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
Bug Fix(es):
* libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109)
rocky-linux-8-x86-64-baseos-rpms
ldb-tools-2.8.0-1.el8_10.x86_64.rpm
537edf41dcd5d3199d6ff54ef671467c927f9fcc54a1f1ac932434c25af8c652
libldb-2.8.0-1.el8_10.x86_64.rpm
1d1615f71e57c248fde5c23487720016686f22b4aa7388ab7fc64c8433f75d69
libldb-devel-2.8.0-1.el8_10.x86_64.rpm
56e0667a3ed5b27350118777a1b1e4ecc0a81a143cdd5b1f240efe2f4cd118bc
python3-ldb-2.8.0-1.el8_10.x86_64.rpm
88769d1b0d94f8638473ab904d87ba7d7e335a1aa3c31afe1b8b5040fdb43d6f
RLBA-2024:6982
blktrace bug fix update
The blktrace packages contain a number of utilities to record the I/O trace information for the kernel to user space, and utilities to analyze and view the trace information.
Bug Fix(es):
* Rocky Linux 8.9 - blktrace is still running after duration time exceeded (JIRA:Rocky Linux-17500)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for blktrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The blktrace packages contain a number of utilities to record the I/O trace information for the kernel to user space, and utilities to analyze and view the trace information.
Bug Fix(es):
* Rocky Linux 8.9 - blktrace is still running after duration time exceeded (JIRA:Rocky Linux-17500)
rocky-linux-8-x86-64-baseos-rpms
blktrace-1.2.0-11.el8_10.x86_64.rpm
c0c90166685a56ddc97bc428202ff167877db657023a80107f024b37f2f63714
RLBA-2024:6983
libuser bug fix and enhancement update
The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included.
Bug Fix(es) and Enhancement(s):
* [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111)
* libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libuser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included.
Bug Fix(es) and Enhancement(s):
* [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111)
* libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578)
rocky-linux-8-x86-64-baseos-rpms
libuser-0.62-26.el8_10.x86_64.rpm
4367760f5c2bce19124600987f474ff837bc274825f533a9d52d636f4d7c8eca
python3-libuser-0.62-26.el8_10.x86_64.rpm
e9d86d41bf04bb506257715a54ec7c7bf72d294b841d232966394ae9b1d717a9
RLSA-2024:6986
Low: nano security update
GNU nano is a small and friendly text editor.
Security Fix(es):
* nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file (CVE-2024-5742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for nano.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU nano is a small and friendly text editor.
Security Fix(es):
* nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file (CVE-2024-5742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
nano-2.9.8-3.el8_10.x86_64.rpm
b6803176894c404c804ec57e5947ef4601d0f3ad525bb4d7dde6c05fc1d93111
RLSA-2024:6989
Moderate: expat security update
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
* libexpat: integer overflow (CVE-2024-45492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
* libexpat: integer overflow (CVE-2024-45492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
expat-2.2.5-15.el8_10.x86_64.rpm
61c0534f01e0df8c8ba96dbf47f2a1ca8d68bc6ad87be4449d5b8586aa63664f
expat-devel-2.2.5-15.el8_10.x86_64.rpm
8d9d925962d7c7dbf5bd67ad703040647127603f34ba107b3db4c7eb08cb9e7b
RLSA-2024:7848
Low: openssl security update
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
openssl-1.1.1k-14.el8_10.x86_64.rpm
18d40b3765711cce2ae376d82c93d047792a6f8a8d18c082d814e9dabcfb1126
openssl-devel-1.1.1k-14.el8_10.x86_64.rpm
d9f06faeb9a83214642d8cc8c9b9891defe5493696f9c41ca322c471fa9f1277
openssl-libs-1.1.1k-14.el8_10.x86_64.rpm
03bc23973ae2f1c85cd8db82cc0ee0a142dd66044bb299bfd72744d029f78800
openssl-perl-1.1.1k-14.el8_10.x86_64.rpm
e50b815d5cb1440c6e5601971a12b0045cb73ced27c634300f482708c00fe159
RLEA-2024:8159
microcode_ctl bug fix and enhancement update
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* microcode_ctl: kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) [rhel-8.10.0] (JIRA:Rocky Linux-30859)
* microcode_ctl: kernel: Local information disclosure on Intel(R) Atom(R) processors [rhel-8.10.0] (JIRA:Rocky Linux-30862)
* microcode_ctl: kernel: Local information disclosure in some Intel(R) processors [rhel-8.10.0] (JIRA:Rocky Linux-30865)
* microcode_ctl: kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode [rhel-8.10.0] (JIRA:Rocky Linux-30868)
* microcode_ctl: kernel: Possible Denial of Service on Intel(R) Processors [rhel-8.10.0] (JIRA:Rocky Linux-30871)
* microcode_ctl: intel-microcode: Race conditions in some Intel(R) Processors [rhel-8] (JIRA:Rocky Linux-41093)
* microcode_ctl: intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors [rhel-8.10.z] (JIRA:Rocky Linux-41108)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* microcode_ctl: kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) [rhel-8.10.0] (JIRA:Rocky Linux-30859)
* microcode_ctl: kernel: Local information disclosure on Intel(R) Atom(R) processors [rhel-8.10.0] (JIRA:Rocky Linux-30862)
* microcode_ctl: kernel: Local information disclosure in some Intel(R) processors [rhel-8.10.0] (JIRA:Rocky Linux-30865)
* microcode_ctl: kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode [rhel-8.10.0] (JIRA:Rocky Linux-30868)
* microcode_ctl: kernel: Possible Denial of Service on Intel(R) Processors [rhel-8.10.0] (JIRA:Rocky Linux-30871)
* microcode_ctl: intel-microcode: Race conditions in some Intel(R) Processors [rhel-8] (JIRA:Rocky Linux-41093)
* microcode_ctl: intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors [rhel-8.10.z] (JIRA:Rocky Linux-41108)
rocky-linux-8-x86-64-baseos-rpms
microcode_ctl-20240531-1.el8_10.x86_64.rpm
c12ca5d0f6547835c6d445f389ca2c67d3cde7c19f6cbbbda850294cdc35b358
RLBA-2024:8805
tzdata bug fix and enhancement update
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2024b, which addresses recent
changes. Notably:
* This is an optional update. This update does not contain any urgent time zone changes.
* Several changes to improve historical data and conformance.
* A variety of changes documented in detail in the NEWS file.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2024b, which addresses recent
changes. Notably:
* This is an optional update. This update does not contain any urgent time zone changes.
* Several changes to improve historical data and conformance.
* A variety of changes documented in detail in the NEWS file.
rocky-linux-8-x86-64-baseos-rpms
tzdata-2024b-4.el8.noarch.rpm
f414a56c04ba79814455084acd08fdb629ec60f262b38536458f70538d870767
RLEA-2024:8852
libproxy bug fix and enhancement update
The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies.
Bug Fix(es) and Enhancement(s):
* libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies.
Bug Fix(es) and Enhancement(s):
* libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660)
rocky-linux-8-x86-64-baseos-rpms
libproxy-0.4.15-5.5.el8_10.x86_64.rpm
d41213a16c07034463763a3dfb9963f99b72e9cde1d2e03430a760b6a44c8d87
python3-libproxy-0.4.15-5.5.el8_10.noarch.rpm
8cef7931b27c0f17dff2d75c16d7234fab2334523d64c49271939e4c1f77a7f7
RLBA-2024:8854
grub2 bug fix update
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es):
* BLS snippets in /boot/loader/entries are improperly labeled with "module_object_t" SELinux context (JIRA:Rocky Linux-4395)
* [Rocky Linux8.10/Grub/SCAP/Bug] conflicting requirements of permissions on grub2-pc grub.cfg (JIRA:Rocky Linux-58835)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es):
* BLS snippets in /boot/loader/entries are improperly labeled with "module_object_t" SELinux context (JIRA:Rocky Linux-4395)
* [Rocky Linux8.10/Grub/SCAP/Bug] conflicting requirements of permissions on grub2-pc grub.cfg (JIRA:Rocky Linux-58835)
rocky-linux-8-x86-64-baseos-rpms
grub2-common-2.02-158.el8_10.rocky.0.1.noarch.rpm
7ac05d14c767cf0b47b36e9db8242fbae280a60e47ed42b10940d6b376db1031
grub2-efi-aa64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
5814cbf5ac6d266f94d1c08f39d4d02fb96cdd3b103709b30cee8dc5796ee555
grub2-efi-ia32-2.02-158.el8_10.rocky.0.1.x86_64.rpm
b3ea83fb7e2e076890904358fa4a8c2e375e0430a9375b132588ea2397211b89
grub2-efi-ia32-cdboot-2.02-158.el8_10.rocky.0.1.x86_64.rpm
7ee83a120119c280cd5f8dce037cb0c6865abfadc131665f5357ead2f68817b7
grub2-efi-ia32-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
90a64a141a8111b7f4f7f219ff54530a0d5687992f563f77f0125701b265e835
grub2-efi-x64-2.02-158.el8_10.rocky.0.1.x86_64.rpm
41ad7c4bbf8b86823492f889eb22666d5019463bf1756c0a92580e404e41c80a
grub2-efi-x64-cdboot-2.02-158.el8_10.rocky.0.1.x86_64.rpm
49b4ebb54ba8f7edcc34ed8c6e4d295060081d551e5c1ec3a9ec897bf4956988
grub2-efi-x64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
8c01f46d0353c0234a2458f0430e723a1b66ea6c69b047088ceec25e120b11f5
grub2-pc-2.02-158.el8_10.rocky.0.1.x86_64.rpm
f3ceeb4bedb36b53bcc39c6d2051cee02449cc5deb8890b308492707d1d6583b
grub2-pc-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
21193ab9db8e8a345171e3737ee71a65e7d506423fbf9062865bca245d3fc8f8
grub2-tools-2.02-158.el8_10.rocky.0.1.x86_64.rpm
cefb30ae61948ddb61053dacbbe509c36edac42c26a9ef4c0bc3cb18d11c5751
grub2-tools-efi-2.02-158.el8_10.rocky.0.1.x86_64.rpm
07ea927ea7b461bea9c52f93f1404fae01a4e45b2982c85173103981431c09de
grub2-tools-extra-2.02-158.el8_10.rocky.0.1.x86_64.rpm
d4c46ec94aa9d4ff0f10ae1573f342a182fd1b2aabb8fccd520fe79b08b3acef
grub2-tools-minimal-2.02-158.el8_10.rocky.0.1.x86_64.rpm
fc9fd990ae0122d154967cb162ea9cebbd632342658da81fd1b9dd7ae802dfcb
RLBA-2024:8855
chrony bug fix update
The chrony suite, chronyd and chronyc, is an advanced implementation of the Network Time Protocol (NTP), specially designed to support systems with intermittent connections. It can synchronize the system clock with NTP servers, hardware reference clocks, and manual input. It can also operate as an NTPv4 (RFC 5905) server or peer to provide a time service to other computers in the network.
Bug Fix(es):
* Enable support for AES-CMAC into chrony 4.5.z with Rocky Linux 8.10 (JIRA:Rocky Linux-59032)
* chronyd crashing [rhel-8.10.z] (JIRA:Rocky Linux-59112)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chrony.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The chrony suite, chronyd and chronyc, is an advanced implementation of the Network Time Protocol (NTP), specially designed to support systems with intermittent connections. It can synchronize the system clock with NTP servers, hardware reference clocks, and manual input. It can also operate as an NTPv4 (RFC 5905) server or peer to provide a time service to other computers in the network.
Bug Fix(es):
* Enable support for AES-CMAC into chrony 4.5.z with Rocky Linux 8.10 (JIRA:Rocky Linux-59032)
* chronyd crashing [rhel-8.10.z] (JIRA:Rocky Linux-59112)
rocky-linux-8-x86-64-baseos-rpms
chrony-4.5-2.el8_10.x86_64.rpm
e20c27df84b673dee278b8995100442429cc1423760027bee249c7a2774de2f9
RLSA-2024:8856
Moderate: kernel security update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857)
* kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492)
* kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851)
* kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924)
* kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017)
* kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)
* kernel: nouveau: lock the client object tree. (CVE-2024-27062)
* kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
* kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939)
* kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608)
* kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)
* kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541)
* kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540)
* kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503)
* kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924)
* kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961)
* kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983)
* kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (CVE-2024-40984)
* kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773)
* kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009)
* kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042)
* kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066)
* kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092)
* kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)
* kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070)
* kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)
* kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244)
* kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)
* kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)
* kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301)
* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)
* kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880)
* kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936)
* kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889)
* kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892)
* kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935)
* kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989)
* kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990)
* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)
* kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826)
* kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857)
* kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492)
* kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851)
* kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924)
* kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017)
* kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)
* kernel: nouveau: lock the client object tree. (CVE-2024-27062)
* kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
* kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939)
* kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608)
* kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)
* kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541)
* kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540)
* kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503)
* kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924)
* kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961)
* kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983)
* kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (CVE-2024-40984)
* kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773)
* kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009)
* kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042)
* kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066)
* kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092)
* kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)
* kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070)
* kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)
* kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244)
* kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)
* kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)
* kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301)
* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)
* kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880)
* kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936)
* kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889)
* kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892)
* kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935)
* kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989)
* kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990)
* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)
* kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826)
* kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.27.1.el8_10.x86_64.rpm
7350d5d8d668f81fa82d6504cc20579c47410d042134da8d81ba916e9cb84a8b
kernel-4.18.0-553.27.1.el8_10.x86_64.rpm
75f7258d755d54f73f63eddfa83bca3b28419ba7dc1e941eeec115fc4b8f0c0f
kernel-abi-stablelists-4.18.0-553.27.1.el8_10.noarch.rpm
d72ee6a6ae36b2d434a126ed68f3d248f2faeaaa0ea8a00b8d86de1b19952d18
kernel-core-4.18.0-553.27.1.el8_10.x86_64.rpm
9de543df6b4283a5057082040e7debbfd4300b09e31bc501de6ba5bb3c705e61
kernel-cross-headers-4.18.0-553.27.1.el8_10.x86_64.rpm
98d4608e0ec5f65932f6af116e98f1b69e904079d29e792f9813a6b8f8d8c241
kernel-debug-4.18.0-553.27.1.el8_10.x86_64.rpm
50f9fca4acba2c0b1a6e8099730d4a5e6eb6b54f4d56ebdc14e377c60bbdfe11
kernel-debug-core-4.18.0-553.27.1.el8_10.x86_64.rpm
ff624fd33cead14d2cc2f9ebc49ab55e6cea2f66b253f800dae6f7b710e71c6a
kernel-debug-devel-4.18.0-553.27.1.el8_10.x86_64.rpm
fca6320f6882c518902d9794417a1ac53aaae32fde0f6125d592da6a766eca06
kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64.rpm
d3c5c4eed84b16737b74b7df3f8d5c24aae4a8468e6d9b7737ceb5940c91addf
kernel-debug-modules-4.18.0-553.27.1.el8_10.x86_64.rpm
bb03cbf8d6c89d0506211b9af93002c974db87f3f982332d3cbdceadd621cf24
kernel-debug-modules-extra-4.18.0-553.27.1.el8_10.x86_64.rpm
fbcfa4c2321cbcafdb177c3ed640e7cad7110ebad12da0a151bd930a490fdfff
kernel-devel-4.18.0-553.27.1.el8_10.x86_64.rpm
25c4e5d1ad05da879b4ca73bd15679c038fa0b74f4e9553d29e658eb9a914f09
kernel-doc-4.18.0-553.27.1.el8_10.noarch.rpm
5bfcdf6525369d32ddae9a4d73e97f9ede62fd6355513cc0fcae450c3e34d1f0
kernel-headers-4.18.0-553.27.1.el8_10.x86_64.rpm
9150f8d9bb531d9bbeaf1a2c98ac5d815247a5c1016fa767a7ce5327bbca71d9
kernel-modules-4.18.0-553.27.1.el8_10.x86_64.rpm
2bc901103dcca2f56e008992ca25e037e83a5f5b5ac49130cacfaef05f8dfe98
kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64.rpm
f43a16113d7eaf881e8bb3050fc6a62e489eb647672f8e5c374af9083122321f
kernel-tools-4.18.0-553.27.1.el8_10.x86_64.rpm
f925a9b11608966c791609ef8e8b116447bc8073c0a8be20a8022f87f76844ef
kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64.rpm
23933dd29c487d627afa4aceb6fc75283cffff5bb92af17be7a549f687a69185
perf-4.18.0-553.27.1.el8_10.x86_64.rpm
afd540b1ce9d3dccf87d364133c431b50cf09b390cd383ae9bd824e05e2cd6aa
python3-perf-4.18.0-553.27.1.el8_10.x86_64.rpm
bf803928e455595e05ca96de7cbf6a55a550ccabe1f041306350a46135a07792
RLEA-2024:8857
microcode_ctl bug fix and enhancement update
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* microcode_ctl: Denial of Service [rhel-8.10.z] (JIRA:Rocky Linux-59081)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* microcode_ctl: Denial of Service [rhel-8.10.z] (JIRA:Rocky Linux-59081)
rocky-linux-8-x86-64-baseos-rpms
microcode_ctl-20240910-1.el8_10.x86_64.rpm
cbafd011353c49eb44b0eb39add3b960412f8145ff67f9012096e7fd57ae86c3
RLBA-2024:8858
linux-firmware bug fix update
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Bug Fix(es):
* Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-62359)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Bug Fix(es):
* Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-62359)
rocky-linux-8-x86-64-baseos-rpms
iwl1000-firmware-39.31.5.1-125.el8_10.1.noarch.rpm
a66528012cc956ae20d41308e6611bb9f129f51c517cd8b4ef5e34fb276a932f
iwl100-firmware-39.31.5.1-125.el8_10.1.noarch.rpm
fba5e32e3ae6034543159d5ab4b05d5344f6e8345184bfe925a7f3f3ccdaabba
iwl105-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
accc10162f0f3697868a1a77055d1f35d380db5613e1b4ae0ffc398fcf7db594
iwl135-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
442ecd6f7e593bca75cb8af3902d0c56eac5821798ef22746a6a3d823d23607d
iwl2000-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
9d3dc1710d002797c9373aee7202977f893c5a9947465a7c6357b10ab63eed74
iwl2030-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
133c2cae6c4bdda644980bff538282a18163103f61d20ebf5669e1cbfb5595aa
iwl3160-firmware-25.30.13.0-125.el8_10.1.noarch.rpm
f8d85082d45d3eb5c54033027965d10f4850210a1665dc5fe032cdbfd67e506a
iwl3945-firmware-15.32.2.9-125.el8_10.1.noarch.rpm
2f3da47cda51d118bf88b40085bdd05f11c1d30341e9247c8f1d25bde87c1c33
iwl4965-firmware-228.61.2.24-125.el8_10.1.noarch.rpm
65688a2a8c2957ca69df1141ba779e89ee91ce22a682245f97a4c133162f6eb5
iwl5000-firmware-8.83.5.1_1-125.el8_10.1.noarch.rpm
09b18ab9dcdbf2a718f15297ede7c88b4f280f364aae58c33e03154f9a6997e7
iwl5150-firmware-8.24.2.2-125.el8_10.1.noarch.rpm
b39d6682ed74ae05d9fc3e8a82bc894feb6df7c541c9171426b293072afbf091
iwl6000-firmware-9.221.4.1-125.el8_10.1.noarch.rpm
a9718054c9d79f701661b8bfbc610a51f2d05e43ed33676f6d0250399e8e0884
iwl6000g2a-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
d01b1866e8d7b478593ee1767c0354bba6e29a5b2fe7527e4d13a35d747af0b0
iwl6000g2b-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
e566a80fdf6b48d80a14f01c0695600cc4ea074c298faeec311606a11d76fcaa
iwl6050-firmware-41.28.5.1-125.el8_10.1.noarch.rpm
ad395b814f8c1c21d68ec905e209539214110860e9318f83cca673e07a2b51e1
iwl7260-firmware-25.30.13.0-125.el8_10.1.noarch.rpm
a0af61194dc88b4d645867c9bf346ae4b69c05df70030d33e03aacb75fe89745
libertas-sd8686-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
daa97b1a030ef6c4bcab8cf8a2097d53134eccc133a723d417631bca1f301b4c
libertas-sd8787-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
a71b4f019ddcadd243b08550a7fb764678b534ea334f5fc6b9dd7afd42aa664a
libertas-usb8388-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
4bab692d7831674103e18bd960b4f5dd2c72cf617b38a0b42d7a82ff49ef4b9f
libertas-usb8388-olpc-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
fa3203a938e9560ed0be442a6395e1057ea9990bb1d8cc5afd65ab06197a9dd2
linux-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
9a7fadb3f747503109a5c263b3762a490f1193c31a9fb7da944c82078df2f4bc
RLSA-2024:8859
Moderate: xmlrpc-c security update
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
xmlrpc-c-1.51.0-10.el8_10.x86_64.rpm
a291748064b5e9b96895b3752a1c024d7accd5a42b562f76d6eefe968fd49bef
xmlrpc-c-client-1.51.0-10.el8_10.x86_64.rpm
8b03c125a7910a8363c744836320eef2b8d209dd3a4c67f2018f8a588097f2a3
RLSA-2024:8860
Important: krb5 security update
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
krb5-devel-1.18.2-30.el8_10.x86_64.rpm
af4acbbcf008f05c9d0ce1d34e7d163bc8f994e4c027f507ecaaaf57d1c6a85a
krb5-libs-1.18.2-30.el8_10.x86_64.rpm
7f20b45ff0cdd6655f691e12518aa795dc447cbdb0fe20e4a5dcac5dc782bb90
krb5-pkinit-1.18.2-30.el8_10.x86_64.rpm
014920157a0d8e3e7b8828847a640aab91b9a223728aff2673f4c5f91efb2914
krb5-server-1.18.2-30.el8_10.x86_64.rpm
3c7d68c85a2e8a630e73e4c6992393f22864461fc8d300f49c40daa348c0ffe5
krb5-server-ldap-1.18.2-30.el8_10.x86_64.rpm
7c0f8d349c008c30603f2b486b9253f51934aebf4ada9b58c18032060fed56b8
krb5-workstation-1.18.2-30.el8_10.x86_64.rpm
d5904073fda2dd791c3d682f052fb3ca5147494b27741d1abda82b842b5dd850
libkadm5-1.18.2-30.el8_10.x86_64.rpm
ed75ed1e2fe5c296071294c910ff231a93cc858ec0d9b173b7def39c8ed5504c
RLBA-2024:8861
openldap bug fix update
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network.
Bug Fix(es):
* LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network.
Bug Fix(es):
* LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538)
rocky-linux-8-x86-64-baseos-rpms
openldap-2.4.46-20.el8_10.x86_64.rpm
099731c0303a4dbe542577c6ede6347878606b5dd386481b746b98c8f3edd095
openldap-clients-2.4.46-20.el8_10.x86_64.rpm
aa91a61331539bc2a959515f5fff33b49d029a6fc1872c0dafdc4f0a7fef2a1b
openldap-devel-2.4.46-20.el8_10.x86_64.rpm
d77c2b9c6b058582430a30a1f5d5e8f3881785bf811b89da1989ae2f6e320a86
RLBA-2024:8866
glib2 bug fix update
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es):
* Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es):
* Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828)
rocky-linux-8-x86-64-baseos-rpms
glib2-2.56.4-165.el8_10.x86_64.rpm
653e7dc5ef8db19bb46e75e8e2ea78fecce6b5cdaefc77c27700f153dc7175f1
glib2-devel-2.56.4-165.el8_10.x86_64.rpm
5efb9e58fd3503f158ade42c6a3d56c40ebd599b9a3990e6e2b5b92f0778f58c
glib2-fam-2.56.4-165.el8_10.x86_64.rpm
c3afe88a019997c7cd7bfef45b25d463aebdb096e68a2fb6e3d85a9bb441adfa
glib2-tests-2.56.4-165.el8_10.x86_64.rpm
2793c12743f6db63923865b44b30e4b1eea6a69a977dbf145691d3f525be08ad
RLSA-2024:8922
Low: bzip2 security update
The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs.
Security Fix(es):
* bzip2: out-of-bounds write in function BZ2_decompress (CVE-2019-12900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for bzip2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs.
Security Fix(es):
* bzip2: out-of-bounds write in function BZ2_decompress (CVE-2019-12900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bzip2-1.0.6-27.el8_10.x86_64.rpm
33663442e582669bad88a4eddf1cb7ec6f5e71b4577a628203600fa540a4d016
bzip2-devel-1.0.6-27.el8_10.x86_64.rpm
5b16c16beb3cb0475c5f889bffb2c9cd3975842f53eca8adccebdf3034874a01
bzip2-libs-1.0.6-27.el8_10.x86_64.rpm
e50288c79ae6b228be4d05b47a496f61bfb11d16c7d1ef8a2539745cc9f5aa41
RLSA-2024:9502
Moderate: expat security update
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: DoS via XML_ResumeParser (CVE-2024-50602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: DoS via XML_ResumeParser (CVE-2024-50602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
expat-2.2.5-16.el8_10.x86_64.rpm
8a9abbc6a76238007f3e7b65e9b4c5d523d669dc433e968f2c78000ffaa980cb
expat-devel-2.2.5-16.el8_10.x86_64.rpm
2796be763a9f11e0395d3e52231bdf880985b4f2a90ee1d081e9f43b1b32e8c9
RLSA-2024:9573
Important: libsoup security update
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: infinite loop while reading websocket data (CVE-2024-52532)
* libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: infinite loop while reading websocket data (CVE-2024-52532)
* libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
libsoup-2.62.3-6.el8_10.x86_64.rpm
3eca16716bca393a72a6d531f01fd121501c91a41528ba88aea001f304c486fc
RLSA-2024:9689
Low: binutils security update
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Security Fix(es):
* binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Security Fix(es):
* binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
binutils-2.30-125.el8_10.x86_64.rpm
b45971a9a1f2df9710438dcb19adc0b21778a2bb3edf04d23aad107042518059
RLBA-2019:3534
libsemanage bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
rocky-linux-8-x86-64-baseos-rpms
libsemanage-2.9-10.el8_10.x86_64.rpm
79e308a78eb7d93c7159042c776fc406a635aaed89819feca94a8e33f50ce184
python3-libsemanage-2.9-10.el8_10.x86_64.rpm
b58451d8a78ebaf488888a312a764ce575c730dcc78926e1e9a3537ddea47939
RLSA-2024:10281
Moderate: kernel:4.18.0 security update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: edia: dvbdev: fix a use-after-free (CVE-2024-27043)
* kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399)
* kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564)
* kernel: mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: edia: dvbdev: fix a use-after-free (CVE-2024-27043)
* kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399)
* kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564)
* kernel: mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.30.1.el8_10.x86_64.rpm
6d14928a0d6bf4ac79896b5ae81d199a4ec4205f11b31312717da36afd6d38c3
kernel-4.18.0-553.30.1.el8_10.x86_64.rpm
40efc54c866b45c7485cb3d687da58e7c5813fb7cd081ae4ec7454e30a267a56
kernel-abi-stablelists-4.18.0-553.30.1.el8_10.noarch.rpm
987a44cd1a13de87d1bab74d90dae7cb192b773b48a381312fd96c937cd7be52
kernel-core-4.18.0-553.30.1.el8_10.x86_64.rpm
8e093520756dc858f490ad816486bd604f8a2e5f1b51cde02e7ebcda43acd207
kernel-cross-headers-4.18.0-553.30.1.el8_10.x86_64.rpm
b55b8d905bd109a8ad15e204c0193b7c39ead10cf805c46a34fa4a9f3da2cc79
kernel-debug-4.18.0-553.30.1.el8_10.x86_64.rpm
498db7d2eca00bb44f11eb65f4a15090b8c27480dd21526800439ba520ebdea8
kernel-debug-core-4.18.0-553.30.1.el8_10.x86_64.rpm
417562e3604878f7ccd9f1b41073ddd68cb3b2dd950a616b3c215f6bd477363d
kernel-debug-devel-4.18.0-553.30.1.el8_10.x86_64.rpm
c446c066f1051af1928d6ab00f16fac1f10b75017cde659d741b5f11040aa772
kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64.rpm
155e9f4ea45602860c659ae715f6cc7244acbdd176c1f747af229c0bf0406a1b
kernel-debug-modules-4.18.0-553.30.1.el8_10.x86_64.rpm
9f1fdc18d2c5636415b6f5406271069a0eff57983fad616242408d9454f0c24d
kernel-debug-modules-extra-4.18.0-553.30.1.el8_10.x86_64.rpm
10a240dcdcbef8673797b9c738fdbd1e72132aa9c0b1a610a901f5ae9ef4a6b8
kernel-devel-4.18.0-553.30.1.el8_10.x86_64.rpm
757bbe0a32a85318f7ac932584e4caf10b0422860b148c4375e1cd85a2838779
kernel-doc-4.18.0-553.30.1.el8_10.noarch.rpm
f86c40b31ee92244aa0ac6c4b4d815bb0649440a2df89a12610ea5b6ace3d8bb
kernel-headers-4.18.0-553.30.1.el8_10.x86_64.rpm
cc7971802eb30b04a32dae46ebd4ab117fef9766ca1f271e4d8229b2ff1ea732
kernel-modules-4.18.0-553.30.1.el8_10.x86_64.rpm
c438914180225d063785437c0dd3c2fe5fb8a1dc6046a9e914e7f5453eb3ba73
kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64.rpm
ed22140b2989b949460995699463e79bbee16642054de4146133a06ce48220bc
kernel-tools-4.18.0-553.30.1.el8_10.x86_64.rpm
3541d97a577888bfd5e0f44c8aaca7c71437792fa46d71b8593a36ea7ca6caae
kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64.rpm
bf4cfaf335c45aa8ca63806276ab7526e2e3611e02ed2b2bc74d9dad95481ea9
perf-4.18.0-553.30.1.el8_10.x86_64.rpm
cda6a66917567f94e9bf6b33feafa97b3574a2665aa1d4400961975e04eca4a7
python3-perf-4.18.0-553.30.1.el8_10.x86_64.rpm
dbf1ac1cc21576d4995e31887c540905b39a3e9198df5f931b595312051282d3
RLSA-2024:10379
Important: pam security update
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: libpam: Libpam vulnerable to read hashed password (CVE-2024-10041)
* pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: libpam: Libpam vulnerable to read hashed password (CVE-2024-10041)
* pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
pam-1.3.1-36.el8_10.x86_64.rpm
2bd96a4c5fe9e4db860e4e6aaafc7eba78ea0f6de763aa9603d5733aa6170234
pam-devel-1.3.1-36.el8_10.x86_64.rpm
25897bd92966e9a4e231522ae38b94ee2962536e9e57b7ad6dba2700f2768671
RLBA-2024:10663
sos bug fix and enhancement update
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Prepare new plugin for kea dhcp server (JIRA:Rocky Linux-40285)
* [RFE] Sudo plugin is not capturing certain logs. (JIRA:Rocky Linux-56747)
* Create bootc plugin (JIRA:Rocky Linux-58177)
* [rebase] rebase sos to 4.8.1 into Rocky Linux9 (JIRA:Rocky Linux-64159)
* [rebase] rebase sos to 4.8.1 into Rocky Linux8 (JIRA:Rocky Linux-64160)
* sos upload does not deal with 1GB limit (JIRA:Rocky Linux-22732)
* Requesting sosreport be updated to collect information related to rhc-worker-playbook (JIRA:Rocky Linux-27555)
* Include /sys/kernel/debug/sched/debug in sosreport (JIRA:Rocky Linux-44353)
* [Hyper-V][Rocky Linux-9][RFE] Capture the Hyper-V balloon debugfs file located at /sys/kernel/debug/hv-balloon in sos report (JIRA:Rocky Linux-45980)
* [REF] Capture authselect.conf (JIRA:Rocky Linux-48608)
* RFE: lru_gen is required to be included in sos (JIRA:Rocky Linux-50917)
* Unexpected formating changes in plugin and presets listing (JIRA:Rocky Linux-57675)
* sos upload does not deal with 1GB limit (JIRA:Rocky Linux-58947)
* sos report collects credentials in HTTP(S)_PROXY environment (JIRA:Rocky Linux-60130)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Prepare new plugin for kea dhcp server (JIRA:Rocky Linux-40285)
* [RFE] Sudo plugin is not capturing certain logs. (JIRA:Rocky Linux-56747)
* Create bootc plugin (JIRA:Rocky Linux-58177)
* [rebase] rebase sos to 4.8.1 into Rocky Linux9 (JIRA:Rocky Linux-64159)
* [rebase] rebase sos to 4.8.1 into Rocky Linux8 (JIRA:Rocky Linux-64160)
* sos upload does not deal with 1GB limit (JIRA:Rocky Linux-22732)
* Requesting sosreport be updated to collect information related to rhc-worker-playbook (JIRA:Rocky Linux-27555)
* Include /sys/kernel/debug/sched/debug in sosreport (JIRA:Rocky Linux-44353)
* [Hyper-V][Rocky Linux-9][RFE] Capture the Hyper-V balloon debugfs file located at /sys/kernel/debug/hv-balloon in sos report (JIRA:Rocky Linux-45980)
* [REF] Capture authselect.conf (JIRA:Rocky Linux-48608)
* RFE: lru_gen is required to be included in sos (JIRA:Rocky Linux-50917)
* Unexpected formating changes in plugin and presets listing (JIRA:Rocky Linux-57675)
* sos upload does not deal with 1GB limit (JIRA:Rocky Linux-58947)
* sos report collects credentials in HTTP(S)_PROXY environment (JIRA:Rocky Linux-60130)
rocky-linux-8-x86-64-baseos-rpms
sos-4.8.1-1.el8_10.noarch.rpm
798f84da4d24032635a4088de2570411bf1ef5c2a039d7ae23c2a2b822a01161
sos-audit-4.8.1-1.el8_10.noarch.rpm
1ec3f7ba0687d21e7f1818a2610cbdec6c71b77e0052f295c79b111f5480b70f
RLBA-2024:10735
autofs bug fix update
The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy.
Bug Fix(es):
* Sporadic mount failures with amd program maps on Rocky Linux8 (JIRA:Rocky Linux-52402)
* sporadic autofs daemon segfaults (JIRA:Rocky Linux-61670)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy.
Bug Fix(es):
* Sporadic mount failures with amd program maps on Rocky Linux8 (JIRA:Rocky Linux-52402)
* sporadic autofs daemon segfaults (JIRA:Rocky Linux-61670)
rocky-linux-8-x86-64-baseos-rpms
autofs-5.1.4-114.el8_10.1.x86_64.rpm
763a22cb4bdafaaec9425eb782a4cf24431223e786f56d1a0f04c5ed99cc9b5d
RLSA-2024:10779
Moderate: python3:3.6.8 security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
* python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
* python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
platform-python-3.6.8-69.el8_10.rocky.0.x86_64.rpm
a7e8e664d796d6acf79a086c3de1bea2e9d307f4ea15df65df37b03504ef5d26
python3-libs-3.6.8-69.el8_10.rocky.0.x86_64.rpm
70d2e92d065009f3ac5c5465607dd321944305657cb4ced0054be59779b72fc5
python3-test-3.6.8-69.el8_10.rocky.0.x86_64.rpm
7c2ac73722370e496a5ea7a3f3a1319e7bf242718fbc7a786242da1e54123233
RLSA-2024:10943
Moderate: kernel security update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695)
* kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (CVE-2024-49949)
* kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (CVE-2024-50082)
* kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099)
* kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110)
* kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (CVE-2024-50142)
* kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192)
* kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (CVE-2024-50256)
* kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695)
* kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (CVE-2024-49949)
* kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (CVE-2024-50082)
* kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099)
* kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110)
* kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (CVE-2024-50142)
* kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192)
* kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (CVE-2024-50256)
* kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.32.1.el8_10.x86_64.rpm
fbc7ee8af53a168a5acf38f718c3fac9f1fb813b5da62116c4b934bcc559b313
kernel-4.18.0-553.32.1.el8_10.x86_64.rpm
c27290dfff732fda300e90f16f6ea8ed9c10bfc7944f3e079bc96cb572ef0c94
kernel-abi-stablelists-4.18.0-553.32.1.el8_10.noarch.rpm
ee3466f0292e8790260c9bc452911cc81836a95b096a75066525db2c31f2219b
kernel-core-4.18.0-553.32.1.el8_10.x86_64.rpm
e2f957df26f184cb92a8614756e2377bcb0889b870538b73d8e0a5080058dbe7
kernel-cross-headers-4.18.0-553.32.1.el8_10.x86_64.rpm
ccf63c0c864f2dd86e0405b2936ceeb2cfaec17ffacec68a7c78c8da0d35883d
kernel-debug-4.18.0-553.32.1.el8_10.x86_64.rpm
18a1f420f3d42cbf959b8ba2b0a137a9dbe4820988319f556a316c52518ce8b6
kernel-debug-core-4.18.0-553.32.1.el8_10.x86_64.rpm
47776ae251e75983586a581e0c254a3afa14a2e0db519fa91ad9770ac53a4f93
kernel-debug-devel-4.18.0-553.32.1.el8_10.x86_64.rpm
f8b27f5a701f08ff1fb76a03930e09d4d44e704f334f6b14f7253419d43183fc
kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64.rpm
3a69ee2cbc9cd8731ca3dabd14ddd6d797d841aa06bb3a90a3ec3eac146e6522
kernel-debug-modules-4.18.0-553.32.1.el8_10.x86_64.rpm
44b34fd7722ce046b285c2356ad77ae80f8b87200dac3f304d17573adbb2863f
kernel-debug-modules-extra-4.18.0-553.32.1.el8_10.x86_64.rpm
278114b3148ba63f24bf1f461fa7a9714b0a847c55bca63ccde103d91a1452e4
kernel-devel-4.18.0-553.32.1.el8_10.x86_64.rpm
b5504b4cffb1b5c9051be00e42875f47b0bc71a1234eca60f98e1c5f5b2978a3
kernel-doc-4.18.0-553.32.1.el8_10.noarch.rpm
b5b18a468c2208f1c3ba868ed85b20a953ec09437e07c3ef7ec727eaf4bb8ca4
kernel-headers-4.18.0-553.32.1.el8_10.x86_64.rpm
1872a4e9fab25db4648cf01fdac577eebf34b2cc0f1e475f6a4577661335a68d
kernel-modules-4.18.0-553.32.1.el8_10.x86_64.rpm
2e1a1955726e562ed7522c95844f92828365686c11a7d0abde3735dfd4694217
kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64.rpm
cb131889945b5612f62c9813843cc1fb5547d3cb2946115bbf4d28281488a01f
kernel-tools-4.18.0-553.32.1.el8_10.x86_64.rpm
ec4623a32f6265d5a5cdd7209ab96b8d041c45b19311ba6c4fbf9df8f6b0df6e
kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64.rpm
6a593989d076a7246e4274a29490894a335f3ed2b40b72b313f2832d6787917e
perf-4.18.0-553.32.1.el8_10.x86_64.rpm
5c8e20c27547bfc583e3b89d913a756ba20b2e7233220dc01336bab34c5bfe3d
python3-perf-4.18.0-553.32.1.el8_10.x86_64.rpm
81234634881669287a9ba0cc03c3578cac8d3c4eb5e2b0708337095d606ed968
RLBA-2024:11151
sssd bug fix update
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* [RfE] SSSD Failover Enhancements [rhel-8.10.z] (JIRA:Rocky Linux-39085)
* SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-8.10.z] (JIRA:Rocky Linux-66267)
* sssd is skipping GPO evaluation with auto_private_groups [rhel-8.10.z] (JIRA:Rocky Linux-66272)
* possible regression of rhbz#2196521 [rhel-8.10.z] (JIRA:Rocky Linux-66277)
* Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest [rhel-8.10.z] (JIRA:Rocky Linux-67128)
* Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-8.10.z] (JIRA:Rocky Linux-67671)
* sssd backend process segfaults when krb5.conf is invalid [rhel-8.10.z] (JIRA:Rocky Linux-68507)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* [RfE] SSSD Failover Enhancements [rhel-8.10.z] (JIRA:Rocky Linux-39085)
* SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-8.10.z] (JIRA:Rocky Linux-66267)
* sssd is skipping GPO evaluation with auto_private_groups [rhel-8.10.z] (JIRA:Rocky Linux-66272)
* possible regression of rhbz#2196521 [rhel-8.10.z] (JIRA:Rocky Linux-66277)
* Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest [rhel-8.10.z] (JIRA:Rocky Linux-67128)
* Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-8.10.z] (JIRA:Rocky Linux-67671)
* sssd backend process segfaults when krb5.conf is invalid [rhel-8.10.z] (JIRA:Rocky Linux-68507)
rocky-linux-8-x86-64-baseos-rpms
libipa_hbac-2.9.4-5.el8_10.1.x86_64.rpm
c602735a2144b592bb2fc7e332534d76c5bad870193535bfc31a3e9c9dc3ae0b
libsss_autofs-2.9.4-5.el8_10.1.x86_64.rpm
1f701dabcba8ca3d4a21deba9d44f671c5147e562de694a2839b800ec1290ed5
libsss_certmap-2.9.4-5.el8_10.1.x86_64.rpm
3cd660b0073b416fc59cfc9f892774bf2f48d854b3fb06ad80f5b456d657da59
libsss_idmap-2.9.4-5.el8_10.1.x86_64.rpm
4c74372bcc18f97b395b92080943a7708bedd76c2311474f90b7c7b74a4172b9
libsss_nss_idmap-2.9.4-5.el8_10.1.x86_64.rpm
4a982046c3d5b3ec5e997defadc3eddec429d6a7a62236dea6645927b137493e
libsss_simpleifp-2.9.4-5.el8_10.1.x86_64.rpm
7f9dffc5d23008e3974dba3ae0ac735f0b65d3ce3eff289cbe333d58bfc36d03
libsss_sudo-2.9.4-5.el8_10.1.x86_64.rpm
70c9dd14654bd1054ec58192152dac38e013fab11d8f594bd461a8cb24372e08
python3-libipa_hbac-2.9.4-5.el8_10.1.x86_64.rpm
9e52ab7cde4613d125bc9e3379c829d0806c80c4447a5dfe98138e811a67367b
python3-libsss_nss_idmap-2.9.4-5.el8_10.1.x86_64.rpm
9c71fcd96577db608fd600b14815fec1e1b11fbc8cf0466d4b6deaa353342aad
python3-sss-2.9.4-5.el8_10.1.x86_64.rpm
183675115c50f61054dd2c8577a5885657fef9a9795e7a403115387a97091fc0
python3-sssdconfig-2.9.4-5.el8_10.1.noarch.rpm
e3a6b585dd61eaa2c7b007ad3e6ea3e25388ba82e0a158e8de6d669eb9359411
python3-sss-murmur-2.9.4-5.el8_10.1.x86_64.rpm
cc715fe92ca3e34cead436536dd3849e6f777f2b6b0ff36462aa73cc4982a26a
sssd-2.9.4-5.el8_10.1.x86_64.rpm
6531119586f32b0489fb385badd3ccb6591c68bc7aeecbb8ddf775b1ca89cd92
sssd-ad-2.9.4-5.el8_10.1.x86_64.rpm
93540fe49c7a7f0c4e75950f13383320a5b1b82407fbd15d99d9966d774a6f45
sssd-client-2.9.4-5.el8_10.1.x86_64.rpm
bd66df0d522cfa3d82b470ea6c88bef6919a538301a8760a6c53fe8ea8abc5e6
sssd-common-2.9.4-5.el8_10.1.x86_64.rpm
fe840a7df6ff70b99d9802bcb0ffd0a800e4c4f5475636a70d3df38dd7d2f237
sssd-common-pac-2.9.4-5.el8_10.1.x86_64.rpm
fe7e83c2ae74ea317cb0ee28b120449eeb8465e832cd9d763b4fde011465ddb1
sssd-dbus-2.9.4-5.el8_10.1.x86_64.rpm
cbd5e901ebf045ea633f16a706750bce85194e80b8226cba6c8fb498fc173da0
sssd-ipa-2.9.4-5.el8_10.1.x86_64.rpm
d56296d276b6e2e254f72914a06291c1eea5b910f22b9ba2d374f352f8225a46
sssd-kcm-2.9.4-5.el8_10.1.x86_64.rpm
6116dfad4248eb355e6ce3b0d5a4408aa66a193272c036f61805c83e55d4309e
sssd-krb5-2.9.4-5.el8_10.1.x86_64.rpm
fde99f74833d2bd766b51a3bb6d44d0ff582570462cf5f82a1a75913d3bad846
sssd-krb5-common-2.9.4-5.el8_10.1.x86_64.rpm
5a7efc1ee56b9fc89076cfa3dc57ed613c89761dc3fe3765786eb776ba0ad7f1
sssd-ldap-2.9.4-5.el8_10.1.x86_64.rpm
03e780865e29beea62ca3bfaa590e1877ae13b975654a44c001d6795d9b0651e
sssd-nfs-idmap-2.9.4-5.el8_10.1.x86_64.rpm
0d83c52a01775d803bdf3ecdc3c732a942bc295e53269af876502bfef1ac126b
sssd-polkit-rules-2.9.4-5.el8_10.1.x86_64.rpm
ed16844dc383371e9770562da38145560655de2b92828e4e73ce63147a0867a6
sssd-proxy-2.9.4-5.el8_10.1.x86_64.rpm
8e0c56da66a7dc36a762e8d0749a55097e67d25abc3723eb8dd2174a5f429944
sssd-tools-2.9.4-5.el8_10.1.x86_64.rpm
90d271873d850b8f8c7c1b236ec38cf1102dc83f9b6a63fc8673bcd51c50239b
sssd-winbind-idmap-2.9.4-5.el8_10.1.x86_64.rpm
556513f2e54e73619dcd0cefa5379ffdabd548315b047ef74134939c654be746
RLBA-2024:11152
samba bug fix update
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-8.10.z] (JIRA:Rocky Linux-63770)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-8.10.z] (JIRA:Rocky Linux-63770)
rocky-linux-8-x86-64-baseos-rpms
ctdb-4.19.4-6.el8_10.x86_64.rpm
d63d7ebafb47acfbbdfcb412b019b0e37c7af234bc83aa88d8dde087f076ec8b
libnetapi-4.19.4-6.el8_10.x86_64.rpm
af2fa4c98e5d459175c050923755c077d7c2af484bcf90f00e6891b8da90d295
libsmbclient-4.19.4-6.el8_10.x86_64.rpm
826f2e40552417951c3e12e2e01a1783669af91fa4ba6ecc08533196df08ccf7
libwbclient-4.19.4-6.el8_10.x86_64.rpm
f2d3ff06b8383d0e284cfd6e3b6b8deac9ffe6b34f671bd2458c848bdc58d2bf
python3-samba-4.19.4-6.el8_10.x86_64.rpm
4d8878ab79f71dd823ed5571e4f674833d8a8a99c5c76cd7535729b0087b63ae
python3-samba-dc-4.19.4-6.el8_10.x86_64.rpm
7eb7472dfe2a07b60ddec2ebdbe2eb8413ba23fecd7950ab96b3cbbf485262b8
python3-samba-test-4.19.4-6.el8_10.x86_64.rpm
706060813f2f53b9375c091759d5f759f9d28957b5e0fd1c4e4819ee2f96db20
samba-4.19.4-6.el8_10.x86_64.rpm
9b1b3fd57afd1a57be5c5991a1a69a333d4f27f1325a7bdd74b077bf4bbcbcf0
samba-client-4.19.4-6.el8_10.x86_64.rpm
461106b036c0320ae0663f1d93866b3e3adc72374db3e2b6aa2eb38b730eb616
samba-client-libs-4.19.4-6.el8_10.x86_64.rpm
5c2c541db8dc483d2c1a572d7bfcb8c326861c0f8c441cd832b1e70b582f539f
samba-common-4.19.4-6.el8_10.noarch.rpm
9a4b9dc986484607e4c649c2418155d41c967a7aec8c811b8ad287bafabeec36
samba-common-libs-4.19.4-6.el8_10.x86_64.rpm
552aefb664f2070f2c01ac730d1734776c33844a7d96cfce94c264ffe87b257d
samba-common-tools-4.19.4-6.el8_10.x86_64.rpm
f4e703f9f5a66b52d75f706150fc842b73b03884f12e1d324377cca8da8b8b65
samba-dcerpc-4.19.4-6.el8_10.x86_64.rpm
2ae52cee5236502bca51e153b35099264d35d38fb3ee094826e176b4cc9a7790
samba-dc-libs-4.19.4-6.el8_10.x86_64.rpm
da5aa55d90078e50187606ab2ab64ebd473f9574fba532a0fabd787fe950cb68
samba-krb5-printing-4.19.4-6.el8_10.x86_64.rpm
daf324af0af84044e8ef3923a6a143e19007cbfeff32f6d51e179bce27e7c9b9
samba-ldb-ldap-modules-4.19.4-6.el8_10.x86_64.rpm
91afd894512ef35f16fa81680bb805e9e3f2d564fd3a2222a61567b0a4f79eed
samba-libs-4.19.4-6.el8_10.x86_64.rpm
6d5b553dcf888001c49c4e2177f080fad004096f74a1fde283b70de92af4c8d4
samba-pidl-4.19.4-6.el8_10.noarch.rpm
2950ff4fd00e1e3ec495f8f484f8f7bfd16c1efbbeea2fa120a03b69b44fa3e5
samba-test-4.19.4-6.el8_10.x86_64.rpm
6fbf08aba50d61e92e8a1f8fe9aea6ed959396edb6014b64dfcfd5e031be5c7c
samba-test-libs-4.19.4-6.el8_10.x86_64.rpm
5de5b6d58c8b4648296a43206d1ef6319354aaa895eb0a2b759f97d35c33dfc5
samba-tools-4.19.4-6.el8_10.x86_64.rpm
9cce9fb738d2cd53c7856d5b6cdcbcd3f7d71e8f2ebe414fa10d4d725d3e4c41
samba-usershares-4.19.4-6.el8_10.x86_64.rpm
3915b03831e17116491a90e815518e1fd7b71e4159bdc41cc0df62c96c1ce7d8
samba-winbind-4.19.4-6.el8_10.x86_64.rpm
261988f526681d824b7667a20751bfd695f16afa326bca1a775f562e56b7025f
samba-winbind-clients-4.19.4-6.el8_10.x86_64.rpm
2944297016406d41ca170cf55bf2d77e4608b0efa4e71c3e66b7afdfb4d0ec23
samba-winbind-krb5-locator-4.19.4-6.el8_10.x86_64.rpm
7c02528ac602b2a6727f913ed5b12ed3f9e7fdf31f30a5778f9197e8ab19c383
samba-winbind-modules-4.19.4-6.el8_10.x86_64.rpm
59a4893d13dc45ac9ed15d023df78b29e8e04f8c2292e82a6e894c83299e65b6
samba-winexe-4.19.4-6.el8_10.x86_64.rpm
6b33bf7a39884e5c8d86a9113b62f2a212801c31314972f71adf3a6a10254b92
RLBA-2024:11153
mdadm bug fix update
The mdadm packages contain a utility for creating, managing, and monitoring Linux multiple disk (MD) devices.
Bug Fix(es):
* [INTEL Rocky Linux8.10.z BUG][VROC] Fix update_subarray on active volume - missing patch (JIRA:Rocky Linux-20833)
* [Rhel8.10.z] mdadm: After adding entry to /etc/mdadm.conf getting messages "localhost.localdomain:101" cannot be set as name. Reason: Not POSIX compatible. Value ignored" (JIRA:Rocky Linux-45608)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mdadm packages contain a utility for creating, managing, and monitoring Linux multiple disk (MD) devices.
Bug Fix(es):
* [INTEL Rocky Linux8.10.z BUG][VROC] Fix update_subarray on active volume - missing patch (JIRA:Rocky Linux-20833)
* [Rhel8.10.z] mdadm: After adding entry to /etc/mdadm.conf getting messages "localhost.localdomain:101" cannot be set as name. Reason: Not POSIX compatible. Value ignored" (JIRA:Rocky Linux-45608)
rocky-linux-8-x86-64-baseos-rpms
mdadm-4.2-16.el8_10.x86_64.rpm
9f71966e9aaee7e6f86b011bde7aef23f01f4924a0858e280133a411a6ecc8f6
RLBA-2024:11157
unzip bug fix update
The unzip utility is used to list, test, and extract files from zip archives.
Bug Fix(es):
* Unzip Fails on Large Zip Files (1TB) - End-of-centdir-64 Signature Error [rhel-8.10.z] (JIRA:Rocky Linux-45997)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unzip utility is used to list, test, and extract files from zip archives.
Bug Fix(es):
* Unzip Fails on Large Zip Files (1TB) - End-of-centdir-64 Signature Error [rhel-8.10.z] (JIRA:Rocky Linux-45997)
rocky-linux-8-x86-64-baseos-rpms
unzip-6.0-47.el8_10.x86_64.rpm
169367ac80b455a69ab62dabaee6d7465464b1d6792b5f38fd50acf1d0f524ce
RLBA-2024:11158
systemd bug fix update
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* Idle session setting kills the GDM process (JIRA:Rocky Linux-19215)
* User logins are super slow when system has tons of disks attached (JIRA:Rocky Linux-5877)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* Idle session setting kills the GDM process (JIRA:Rocky Linux-19215)
* User logins are super slow when system has tons of disks attached (JIRA:Rocky Linux-5877)
rocky-linux-8-x86-64-baseos-rpms
systemd-239-82.el8_10.3.x86_64.rpm
fd10bcdd6103d6387168a5c88769436da3c51c4b7b2d5a9daaf88738dbedc49e
systemd-container-239-82.el8_10.3.x86_64.rpm
c8d86bbfadd5ea7775ed0d8a881fcdbe05c25c36598587405be2ce0796e670f2
systemd-devel-239-82.el8_10.3.x86_64.rpm
55291a18c4504ed8a30d580c483edef6b9deb48922ed8740edf445721c7d23f6
systemd-journal-remote-239-82.el8_10.3.x86_64.rpm
7f1c6d541a48d5e64d197be81565ac69260e4ace2bb6f6428be73b3c42354f44
systemd-libs-239-82.el8_10.3.x86_64.rpm
a8d0d63a100a16f4b001bf1659fae01138937dd8aae81c0aef6b3093832ff746
systemd-pam-239-82.el8_10.3.x86_64.rpm
3fb54abee0a72e9513e04c961c3ae2088580f4596c6636bab002bf59117e7781
systemd-tests-239-82.el8_10.3.x86_64.rpm
15e9c5efd51dba3c24f5fa6b4ab82743912a2c20528b730abef9303330f30437
systemd-udev-239-82.el8_10.3.x86_64.rpm
2496dfafe1fc64efd83ad5cdc2c0f68ea71c2a6655e0f43f9d765a080582fe28
RLBA-2024:11162
vdo bug fix update
The vdo packages provide Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
Bug Fix(es):
* Rocky Linux In-Place Upgrade engagement using LEAPP and am seeing the /usr/libexec/vdoprepareforlvm --check fail on a read-only disk. (JIRA:Rocky Linux-65721)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The vdo packages provide Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
Bug Fix(es):
* Rocky Linux In-Place Upgrade engagement using LEAPP and am seeing the /usr/libexec/vdoprepareforlvm --check fail on a read-only disk. (JIRA:Rocky Linux-65721)
rocky-linux-8-x86-64-baseos-rpms
vdo-6.2.11.5-14.el8_10.x86_64.rpm
011fbc4eb6db23cf541c4bf2218181c8d04544460f18a8812e021603f838d376
vdo-support-6.2.11.5-14.el8_10.x86_64.rpm
4cc692dcb3bcc04a240cf2fe5271764dd8f49fd13e31f211cc2cb90c56832505
RLSA-2025:0012
Moderate: python-requests security update
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
python3-requests-2.20.0-5.el8_10.noarch.rpm
a2aa9a996f107bf060404602ea15831f10aa12417dc027cde6dca0d200cde385
RLSA-2025:0065
Important: kernel security update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: i40e: fix race condition by adding filter's intermediate sync state (CVE-2024-53088)
* kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: i40e: fix race condition by adding filter's intermediate sync state (CVE-2024-53088)
* kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
bpftool-4.18.0-553.34.1.el8_10.x86_64.rpm
39bd514f4619b3bb525fe7b355a8d8cf9162858b36da18f0951d0fe1151c55c2
kernel-4.18.0-553.34.1.el8_10.x86_64.rpm
e200c00d18a9fe13831fc68964f37bf8db97c42c80980fbcd9f0b4bbb1158080
kernel-abi-stablelists-4.18.0-553.34.1.el8_10.noarch.rpm
3ae7c04c9cb5753adfe3b32eb74aa7eec73935a89fdf6db7efb56283a9f4ab20
kernel-core-4.18.0-553.34.1.el8_10.x86_64.rpm
77df06b828d989127999efb871eb7a918ba6b8273664734d486004e55cbfd57e
kernel-cross-headers-4.18.0-553.34.1.el8_10.x86_64.rpm
d9c6de8cac97b6a9597b7d84c03c78d5a6b6574bd187a671c3305348c24e15bb
kernel-debug-4.18.0-553.34.1.el8_10.x86_64.rpm
3f4e543ddb0cd7b1344737fa294dd640461ea0370571b8ec3979692403f760f5
kernel-debug-core-4.18.0-553.34.1.el8_10.x86_64.rpm
60a82e4710a8d44ce335da663ace3087832c8f6d5227ed848c2f9b7c4fb4e099
kernel-debug-devel-4.18.0-553.34.1.el8_10.x86_64.rpm
ba8871155ff981bd13e769649253e5655f7e517f10572b8b13bf1789651a452a
kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64.rpm
5fbcd94ce990449f6929ea6e82eae6a8981b178b5dbb125fa9171a0caf6e1bcd
kernel-debug-modules-4.18.0-553.34.1.el8_10.x86_64.rpm
a9466ee7d39e1a20ebde7f57aea1f65bdc61f7e05e9c09b6ea11ed3f9add69b7
kernel-debug-modules-extra-4.18.0-553.34.1.el8_10.x86_64.rpm
384751ca1c533afd23170e36a98092c2c7206e389770939a559ca623e443ae34
kernel-devel-4.18.0-553.34.1.el8_10.x86_64.rpm
4225c208d4a3587d9abea748d34619a918385940b36de3040998d36f0a25cbac
kernel-doc-4.18.0-553.34.1.el8_10.noarch.rpm
2834db38150c9c5ab8fa2bb647c483fad1df44ae26899a3b97185cd553592b7a
kernel-headers-4.18.0-553.34.1.el8_10.x86_64.rpm
289fd6e3e29c5e9e87ecbebff82cf244a1e00a25d042c9066cc91c96fb57e40c
kernel-modules-4.18.0-553.34.1.el8_10.x86_64.rpm
51504ad216bf0751541c41f7a1bb262eabfdf650b19f5f5cd361eb7379a54629
kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64.rpm
c54460f4330bd9e15fc8ac8382fddacb52fd3251856da21e34bfe078170263ee
kernel-tools-4.18.0-553.34.1.el8_10.x86_64.rpm
c710702838e981c3349764aac5f33f02d41473df0e30edde5d57a64424918d7e
kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64.rpm
bb538ffe4510103bf9451cf2db682eee03b5bc1712f681af1d29d0bd655dc92f
perf-4.18.0-553.34.1.el8_10.x86_64.rpm
6fd0c9761907c5fb58010e87f8a35217c17e23b6ae864d9ad2bf83ec46b3db39
python3-perf-4.18.0-553.34.1.el8_10.x86_64.rpm
0e660af5f5267d39b9dc91e9b44fcb85de877b9fac0cb9d38f089ba459fb0898
RLSA-2025:0083
Low: cups security update
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: libppd: remote command injection via attacker controlled data in PPD file (CVE-2024-47175)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: libppd: remote command injection via attacker controlled data in PPD file (CVE-2024-47175)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-8-x86-64-baseos-rpms
cups-libs-2.2.6-62.el8_10.x86_64.rpm
b0d0e06219f7248db255b0e2ab79a3c73790d9f7fda176fba643ec8bc536f12c