RLBA-2019:3337 perl:5.24 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLEA-2019:3511 libvarlink bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvarlink. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libvarlink-18-3.el8.x86_64.rpm 8e37e2e47c7124cf126c5a8c50ecb56bea0431c3682b3fa3220662bc4bb2ace2 libvarlink-util-18-3.el8.x86_64.rpm 38a78ef47048039886a3a5de0e74f28b61eee097b1bf4fd61430369fceb9cb5a RLBA-2019:3522 perl-DBD-SQLite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-SQLite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLBA-2019:3529 perl-Math-BigInt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Math-BigInt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac RLBA-2019:3537 checkpolicy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for checkpolicy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms checkpolicy-2.9-1.el8.x86_64.rpm 99298960b34764108eca6376d69cc572d1db3ef6a1720de07dfe388820d46318 RLBA-2019:3542 python-dmidecode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-dmidecode-3.12.2-15.el8.x86_64.rpm 85254cde2ec450fb6f2dd9f57f1ecc56fc16a3bea2f6976b62cb69980acfb6cf RLBA-2019:3546 perl-Socket bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Socket. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-Socket-2.027-3.el8.x86_64.rpm 210f9c20fc35f0db23cc285fe01d48337951f38610e954cefd1bb75bb01a10b2 RLSA-2019:3553 Low: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gdk-pixbuf2-2.36.12-5.el8.x86_64.rpm b9329e5de8573a782d04cdd35bf6c540349259fd71b05fc097baa6d52fba1cd6 RLBA-2019:3558 libzfcphbaapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libhbaapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libhbaapi-2.2.9-13.el8.x86_64.rpm 5b30454dec6b8cfb4cff21b86b2b2f5ac24bfd8b1670893c6126ddf640a3f249 RLBA-2019:3593 ipset bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ipset-7.1-1.el8.x86_64.rpm 22501332b1b75b42a98aa341a80edcc098ec54aa78621e2b3fd4e16bac76ffa0 ipset-libs-7.1-1.el8.x86_64.rpm 03f4ddae9fd27fca79b7c20f90405f304d6143d2985d50b3d322626a61bdcaee ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 RLEA-2019:3608 libaio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libaio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libaio-0.3.112-1.el8.x86_64.rpm c63cf16302ac4d02c13bed0eb384cf131be341a9dbcb413743c897d253b8d5a5 libaio-devel-0.3.112-1.el8.x86_64.rpm 0c255ef4b3da4b21a290923d8a1081444cb52d1b04a49398d23fcba7f4f9fd4c RLBA-2019:3614 dbus-python bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-dbus-1.2.4-15.el8.x86_64.rpm 178e9fcb7cade5c6078c6992e1e101721f947e6355aa96046910e9c1d2d14a04 RLBA-2019:3616 system-storage-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for system-storage-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f RLBA-2019:3621 libidn2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libidn2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libidn2-2.2.0-1.el8.x86_64.rpm ea3af5771feed5c6e8372db9ab809acb23b7851dfb4936cf9b0ac1cddd9eb6c2 RLBA-2019:3627 python-schedutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-schedutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-schedutils-0.6-6.el8.x86_64.rpm d1ea85fc24ecd71a567b71b61480b777eefe7d35dc242ee20389ff8063255265 RLBA-2019:3634 blktrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms blktrace-1.2.0-10.el8.x86_64.rpm 0079f550f6567e1ddf706546acafa77580996e5db37342ae5ca4547a7cb12b6e RLSA-2019:3643 Low: gettext security update The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs. Security Fix(es): * gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for gettext. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs. Security Fix(es): * gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gettext-0.19.8.1-17.el8.x86_64.rpm a797ddfcee732000b4e68ecffd7c50ef7cefe51af92246c01e248ab98c3ae3a7 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-devel-0.19.8.1-17.el8.x86_64.rpm 8383d229584bbc38d2b2d335060b9431c46870e86a99762ef1d0b9aba0109fdd gettext-libs-0.19.8.1-17.el8.x86_64.rpm 558bb32c2c9116a5aa14a745462972f0b8769118a6524aca2ab72bbde863b479 RLBA-2019:3645 gmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gmp-6.1.2-10.el8.x86_64.rpm 9d85101052864ffa596fe1bd1f2d6fe1349f28a912d4bbe2fe9333d39144734d gmp-c++-6.1.2-10.el8.x86_64.rpm dbe706499295b80a71198206294cc230b7ae19724309a58b333563246caa0603 gmp-devel-6.1.2-10.el8.x86_64.rpm 194387ca389070ef23f10cad5b08a7087ccc7ad23f72918de8a66d7f4b15e97e RLBA-2019:3664 nfs4-acl-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs4-acl-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms nfs4-acl-tools-0.3.5-3.el8.x86_64.rpm 2d5f8433daaef591d5ac4e837dc273b12fd79aee1185982b6e696a33a5ce5dcf RLBA-2019:3667 mtr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mtr-0.92-3.el8.x86_64.rpm 2438e443ba3d25741e0f4b22b08fb41ab6029d6492f96a4d8a09d695b86ec720 RLEA-2019:3677 isns-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for isns-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms isns-utils-0.99-1.el8.x86_64.rpm 5be8b3fbcf614d5e6aa2baa445a2b4ad8d23c50f2eececb1b2c504442bd418b6 isns-utils-devel-0.99-1.el8.x86_64.rpm cbcc8ce7cf8fb61f618855c2c683fba8f106a1cc7015e11df3ae795857001ae0 isns-utils-libs-0.99-1.el8.x86_64.rpm e6ee7e4950e05234991b0852a37eadd2ca38656d6e6fb96f1fdd87f29e6d3cde RLBA-2019:3693 python-requests bug fix update The python-requests package contains a library designed to make HTTP requests easy for developers. Bug fix: * The fix CVE-2018-18074 leads to a regression (BZ#1758261) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-requests package contains a library designed to make HTTP requests easy for developers. Bug fix: * The fix CVE-2018-18074 leads to a regression (BZ#1758261) rocky-linux-8-x86-64-baseos-rpms python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 RLSA-2020:0633 Important: ppp security update The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line. Security Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line. Security Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms ppp-2.4.7-26.el8_1.x86_64.rpm d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb RLSA-2020:0902 Important: icu security update The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for icu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms icu-60.3-2.el8_1.x86_64.rpm f1b4645d5eef72c2e6fb9349b2c324b713964758e8066270718f555fb05ebfcd libicu-60.3-2.el8_1.x86_64.rpm 5d6b3bcd416ba36bd1107aa5a70db598b52acdf7bd6a8d6f021e591438a3a2bf libicu-devel-60.3-2.el8_1.x86_64.rpm 6ee3edad33895d25c96dc0b27afb23ee8abd496317283e47bd57cc7ec21b6591 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 RLBA-2020:1759 newt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for newt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms newt-0.52.20-11.el8.x86_64.rpm f61d82c9f375c4a73cae95f3b3eb41218ce894c906d0c3e32d792f0aec24b939 RLSA-2020:1766 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mozjs52-52.9.0-2.el8.x86_64.rpm 303edb185d9c0ff3b990b76cc1fb526acc4a617c943959b19ca961f2fa65801b mozjs60-60.9.0-4.el8.x86_64.rpm 39168874c4eb1ee6a23c3ee625e5a0d83e7b15cc3172171e8c3783ba69db5383 RLEA-2020:1767 flatpak bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bubblewrap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bubblewrap-0.4.0-1.el8.x86_64.rpm caa9312ef14df68d33a27cce5e22d472eac068efda16021394c4d16c2d2e6a04 RLBA-2020:1768 ipcalc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipcalc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ipcalc-0.2.4-4.el8.x86_64.rpm 850ee6e1ed955a3ada21629c5c27f44dddec37d75eea1024d0779a0e08ce30bd RLBA-2020:1781 ModemManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager, usb_modeswitch-data, mobile-broadband-provider-info, libmbim, libqmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd RLBA-2020:1791 libnetfilter_cthelper bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnetfilter_cthelper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libnetfilter_cthelper-1.0.0-15.el8.x86_64.rpm 55d6fea4f31b1767a42b926d7a3c352cc1dd05f5ff3d5d34536cc24aa549f9f8 RLBA-2020:1822 pywbem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pywbem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 RLBA-2020:1839 mcstrans bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mcstrans. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mcstrans-2.9-2.el8.x86_64.rpm c16a97680ef086ecf9ba0c086a3d71d21f7cd5056a2fec2c86cfce66d3583c35 RLBA-2020:1846 conntrack-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for conntrack-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms conntrack-tools-1.4.4-10.el8.x86_64.rpm 2fb578da41af4312f8395570c02f7d3969a101915df202bb7ab2c2bcff5d62a1 RLBA-2020:1850 pigz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pigz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms pigz-2.4-4.el8.x86_64.rpm 2de6c9c49c29bb2bb0b0851e1e05c3607576c7708cbbc607ddcb8aa4636c4aa4 RLSA-2020:1852 Moderate: patch security and bug fix update The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file). Security Fix(es): * patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for patch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file). Security Fix(es): * patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms patch-2.7.6-11.el8.x86_64.rpm 2a9c37c04fdb645c14de1a32eb344cdc53f29c2da8c75267264f4b632630163b RLBA-2020:1853 diffutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for diffutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms diffutils-3.6-6.el8.x86_64.rpm a1b4592d6a8f9c88ed8cc427f053779177a16439b93535179b569031adc87788 RLBA-2020:1871 openssl-pkcs11 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssl-pkcs11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms openssl-pkcs11-0.4.10-2.el8.x86_64.rpm 22c10f2160b0de3f3e14bcc113a2a213168c7aa33941c8c40aed08856eb104c5 RLBA-2020:1891 arpwatch bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for arpwatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms arpwatch-2.1a15-44.el8.x86_64.rpm 4aba514a9ecd56d2107585b268a7e4a967afb0806c18a2f3711d2636464f2efa RLBA-2020:1902 liberation-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liberation-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff RLBA-2020:1910 cifs-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cifs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cifs-utils-6.8-3.el8.x86_64.rpm 287a82f37e037b668afdef6add67ff15f36f21f07355e04626130777e7866c66 pam_cifscreds-6.8-3.el8.x86_64.rpm f9681d292cefcf13793c8d4e8b5e3c20c2fd0613f0160502a4f320a3ecc76745 RLBA-2020:1919 ppp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ppp-2.4.7-26.el8_1.x86_64.rpm d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb RLSA-2020:2231 Important: Rocky Enterprise Software Foundation Ceph Storage 4.1 security, bug fix, and enhancement update Rocky Enterprise Software Foundation Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es): * ceph-ansible: hard coded credential in ceph-ansible playbook (CVE-2020-1716) For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information refer to the CVE page(s) listed in the References section. Bug Fix(es) and Enhancement(s): For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Ceph Storage 4.1 Release Notes available at: https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.1/html/release_notes/index Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for smartmontools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es): * ceph-ansible: hard coded credential in ceph-ansible playbook (CVE-2020-1716) For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information refer to the CVE page(s) listed in the References section. Bug Fix(es) and Enhancement(s): For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Ceph Storage 4.1 Release Notes available at: https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.1/html/release_notes/index rocky-linux-8-x86-64-baseos-rpms smartmontools-7.1-1.el8.x86_64.rpm 020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23 RLSA-2020:2755 Important: nghttp2 security update libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libnghttp2-1.33.0-3.el8_3.1.x86_64.rpm 4a890e3f3c76faec98ac34935a4bd5c79de22ddda79b4d4884729a999f507557 RLSA-2020:3654 Moderate: libcroco security update The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. Security Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libcroco. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. Security Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libcroco-0.6.12-4.el8_2.1.x86_64.rpm 2278152c40bd3053c1dbc8dbd00dd59883cd839dcc8c11738bbe26cc520d246f RLBA-2020:4434 net-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms net-tools-2.0-0.52.20160912git.el8.x86_64.rpm 39265a074e5b4fb1e67e4c6531dc96d5a39fe1d2799a45267a137abde80dc795 RLSA-2020:4436 Low: gnome-software and fwupd security, bug fix, and enhancement update The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for appstream-data, libxmlb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libxmlb-0.1.15-1.el8.x86_64.rpm b10eb2df2f927d4f350fc7eda0210589a952bf6ed4aba81a9276bee26b605b1e RLBA-2020:4437 python-setuptools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 RLSA-2020:4451 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libsoup-2.62.3-2.el8.x86_64.rpm 016ca0305984238d33fea53cf9c1b3d7c80d104d941d2b0ba564e82877c7fe7d python3-gobject-base-3.28.3-2.el8.x86_64.rpm 054d5e126a9616b4597b76efb2866d407c07aa583f35f59d1a641536166e419d RLBA-2020:4452 libhugetlbfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libhugetlbfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libhugetlbfs-2.21-17.el8.x86_64.rpm 611454dbdaee76de3866dae2441a1f2b4f48cb2b83b281969f5fdb3a5bf87395 libhugetlbfs-devel-2.21-17.el8.x86_64.rpm d4a09e04231a2a731f6ec0bd22fe3748b1dd58c133bf41787ed418af16f4ebc3 libhugetlbfs-utils-2.21-17.el8.x86_64.rpm 363c463d261b44cd8f2aa186664a1c2013818d9f4763244f246710c8c2405c55 RLEA-2020:4468 lsof bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lsof. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms lsof-4.93.2-1.el8.x86_64.rpm b4d2f4694b9c55482198c5d525c358186ce46efd96557731044c72e7aede1c1a RLEA-2020:4487 smartmontools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smartmontools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms smartmontools-7.1-1.el8.x86_64.rpm 020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23 RLBA-2020:4488 libkcapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkcapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libkcapi-1.2.0-2.el8.x86_64.rpm 4132f4295574f5e253182356ca865f319830192f02463230b88eea53ca01e863 libkcapi-hmaccalc-1.2.0-2.el8.x86_64.rpm d3b39fc9d0daf55a3db203b4cfba9794b6e280db190a30de4760fef86b827e74 RLBA-2020:4501 iprutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iprutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iprutils-2.4.19-1.el8.x86_64.rpm 675b4d270e6f975c69e3d058cc1264c5c69fd2af1ae21302ee8ee46014bf559c RLEA-2020:4506 python-configshell bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-configshell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff RLBA-2020:4512 libteam bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libteam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libteam-1.31-2.el8.x86_64.rpm 152bf33845fd06b584d2998be9c4f4bfd6e3bed869890881c83d7465113c017e libteam-doc-1.31-2.el8.x86_64.rpm 6a9e9a225d53f8ae97e6821e283f62a2d9b5234ba01567aafb8c8fb147bb7952 network-scripts-team-1.31-2.el8.x86_64.rpm 8ce10c87c100dc14c61f84d527d4aab03a5c4ced3dc9fedf33e7a42047ecd623 teamd-1.31-2.el8.x86_64.rpm cb0ee7ee6223e6a77792f23611cecd151c84018f4d060a6767572b705a29ed95 RLBA-2020:4522 libqb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libqb-1.0.3-12.el8.x86_64.rpm c71e8a2594210d6db2747e8db26b37b87c3a198b41bc8d908cc87d8b9df4dc9f libqb-devel-1.0.3-12.el8.x86_64.rpm be742d786bdbf7a50d32ee3ea1a0e38241e4a7591b9dbb9230dea307cc0d9159 RLBA-2020:4538 logrotate bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for logrotate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms logrotate-3.14.0-4.el8.x86_64.rpm 73460643270dd618329b637a9bc9e2e96b7b70c346ed008e6b763b505eb48fc5 RLEA-2020:4555 libpsl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpsl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libpsl-0.20.2-6.el8.x86_64.rpm 959ed630f56f3d83a87a857e9d3e6f5b835bbed6081bf304a8a5929ca4f7c34d RLEA-2020:4556 libnetfilter_queue bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnetfilter_queue. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libnetfilter_queue-1.0.4-3.el8.x86_64.rpm 9526e529709b247f3beb1bff8b02e37b8ef6dd47d1f63cc4df81d398ee342734 RLBA-2020:4557 zstd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zstd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libzstd-1.4.4-1.el8.x86_64.rpm c3e950878a53d2e6743af8338cf5f0b1afb053034c9eee5ea6797e352d72eca0 libzstd-devel-1.4.4-1.el8.x86_64.rpm 331809e24bcf0caad686f00dfcad0cd3d75b7bd623402194d31e3eb2d2b5f5f9 RLBA-2020:4564 kabi-dw bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kabi-dw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kabi-dw-0-0.10.20200515gitb52ac13.el8.x86_64.rpm 1396a3dfcfc4628e0a611e1a24be8f05e1c61a0e7c49f5cbb4573eed87867ee6 RLBA-2020:4580 kbd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kbd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kbd-2.0.4-10.el8.x86_64.rpm b977c7a619b0b6169de05a40808a1b08155cca9978fbb6b413489d564444f42b kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c RLEA-2020:4587 libusbx bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libusbx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libusbx-1.0.23-4.el8.x86_64.rpm 86732e3f404203f7874186f7593dbef63fba7f57ad82cce2a1de415e2759e7ed libusbx-devel-1.0.23-4.el8.x86_64.rpm 678fa879f4c07f3ae2e365d1e84799baa844822284d83f203867edb7d49e8055 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 RLBA-2020:4592 psmisc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for psmisc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms psmisc-23.1-5.el8.x86_64.rpm a69d8873b2131a2322457e26850d9b9a33daf98f2143f648cd418e7fe1aec9ce RLEA-2020:4596 efivar bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efivar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms efivar-37-4.el8.x86_64.rpm 8904e32e3d0204410a7eb6ec2f0ee99a7ed6fcaa43c2c92a5cc5b34c61b5bb83 efivar-libs-37-4.el8.x86_64.rpm b8284762feb00345dfbb8d8e5257e6ae09e8e135907d2e57ee1df79d5b166a8f RLBA-2020:4600 snappy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for snappy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms snappy-1.1.8-3.el8.x86_64.rpm 2acdbf72851dbba66011a9f66397eeab45a9b48385e9462cee327bc3996deee6 RLEA-2020:4680 lmdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lmdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms lmdb-libs-0.9.24-1.el8.x86_64.rpm 79d1d3d6adae5cbea37a12157bf7b625b4868d61ba01abd4cd6134f973dfa350 RLEA-2020:4727 new module: perl:5.30 This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLEA-2020:4767 perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLEA-2020:4802 perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLBA-2020:4841 liburing bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liburing. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms liburing-1.0.7-3.el8.x86_64.rpm 42cc626f78d9460239168948760b8ad1992cd7050a53c889c1e50ab654c83953 RLBA-2021:0564 dbxtool bug fix and enhancement update The dbxtool packages provide a command line utility and a one-shot systemd service for applying UEFI Secure Boot DBX updates. Bug Fix(es) and Enhancement(s): * [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is malformed' (BZ#1912474) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbxtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dbxtool packages provide a command line utility and a one-shot systemd service for applying UEFI Secure Boot DBX updates. Bug Fix(es) and Enhancement(s): * [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is malformed' (BZ#1912474) rocky-linux-8-x86-64-baseos-rpms dbxtool-8-5.el8_3.2.x86_64.rpm db6f49de47d206b32aeaec6ca21494df84ba9cd832fa3c8214c71acf9155732d RLSA-2021:0618 Important: stunnel security update Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption. Security Fix(es): * stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for stunnel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption. Security Fix(es): * stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms stunnel-5.56-5.el8_3.x86_64.rpm 007b91d221867f26728ec23985fdc988ae188615edab218683cc910e03135e57 RLSA-2021:1586 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gamin-0.1.10-32.el8.x86_64.rpm e2bb04623867c9df4b216726746d35e807471d4a2c2d2762c62be19b5ceb24c3 RLBA-2021:1587 librabbitmq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librabbitmq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms librabbitmq-0.9.0-3.el8.x86_64.rpm 394dee37cc31d56e94a4b11529f302a8035d46bbcaa525dbb2970ad28e5449b0 RLBA-2021:1591 libxslt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libxslt-1.1.32-6.el8.x86_64.rpm 9835b367c819ac0145a2981f5a4c8706d27c01086db8bd37b9ca3a2000d2a912 RLBA-2021:1599 memtest86+ bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memtest86+. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms memtest86+-5.01-20.el8.x86_64.rpm 731ecc28e5fcfb659cc3cccc10d4f991ccafbb487ea38875b54a10f70e0b7d3f RLSA-2021:1600 Moderate: opensc security, bug fix, and enhancement update The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures. Security Fix(es): * opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570) * opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571) * opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opensc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures. Security Fix(es): * opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570) * opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571) * opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms opensc-0.20.0-4.el8.x86_64.rpm 90025cea2f96b0c026abfb8070d3fce48f42d7e1471ec16ac15fd8ae5914010d RLSA-2021:1609 Moderate: p11-kit security, bug fix, and enhancement update The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files. The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853) Security Fix(es): * p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361) * p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362) * p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for p11-kit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files. The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853) Security Fix(es): * p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361) * p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362) * p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms p11-kit-0.23.22-1.el8.x86_64.rpm 9f5dc45c3d292f4de8d942344546c66a5cca10d5a87676855d0cd12c11f1f72d p11-kit-devel-0.23.22-1.el8.x86_64.rpm 4e6994a41a394d1a9d1741ba2c8347a9d018f69db5581e17555c9b803c005d4f p11-kit-server-0.23.22-1.el8.x86_64.rpm 987cdbf6d866c5645723dd066c6fde16b9a684c0457f4600f90e04e0717e75d7 p11-kit-trust-0.23.22-1.el8.x86_64.rpm 050416bf341c01cacc9b6f5e815261ca96ea2fefdb8463238779665bb55a5704 RLBA-2021:1612 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms avahi-0.7-20.el8.x86_64.rpm 30ae1a91bfb06b039d06c46116973863d9d456167444d9bf38d958db678e4c9d avahi-autoipd-0.7-20.el8.x86_64.rpm b9a86831b5c1a2bdc66cf9eb87bc1b90addb654c193fc6afc8cc6337a08b254d avahi-glib-0.7-20.el8.x86_64.rpm 0224bd59eef3020c7c236f708b218468de8620a0a911607e41dd31083c67b2e5 avahi-gobject-0.7-20.el8.x86_64.rpm deff9ad93a1c8146f0176e3b12c4486b8936978750fe704329f041c6163bebaf avahi-libs-0.7-20.el8.x86_64.rpm 4025ada765b99bd04a94850b628b480d30d997674671bd78d2f73ed3acf37a55 python3-avahi-0.7-20.el8.x86_64.rpm 894452b2d8041877e03ce500b4cb5002ac5a9031ae95cf88b41100e0b90aee09 RLBA-2021:1619 efi-rpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efi-rpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 RLSA-2021:1627 Moderate: trousers security, bug fix, and enhancement update TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware. The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782) Security Fix(es): * trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331) * trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332) * trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware. The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782) Security Fix(es): * trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331) * trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332) * trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms trousers-0.3.15-1.el8.x86_64.rpm 8f1492620ac321ff0378faa79995d7f354700cf33519301a3125e70a590f2c35 trousers-lib-0.3.15-1.el8.x86_64.rpm c50f3d36f6be357210617fd2069888b74eb518e3f0e142056b40c3ba7ce5f3b8 RLBA-2021:1628 tpm-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tpm-tools-1.3.9.2-1.el8.x86_64.rpm aed34d6a2d00ab7d34ef7c4ca9e94bf7dd68eaa181f39e06eb8c07090ccf478f tpm-tools-pkcs11-1.3.9.2-1.el8.x86_64.rpm 6510710eb7e3864b257fe5e634e95347b84edb6aa6c6bdb90a53efbdc6348b82 RLSA-2021:1631 Moderate: python-urllib3 security update The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 RLEA-2021:1658 pciutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pciutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms pciutils-3.7.0-1.el8.x86_64.rpm 97afa829cd42b70ed06b0a497db799eb06525945416f1fda6ff91863ca1e316e pciutils-devel-3.7.0-1.el8.x86_64.rpm c02c7068a22d27095c55832156e3d3accb08b4299ffa259c784d1136b5180a48 pciutils-libs-3.7.0-1.el8.x86_64.rpm d97cbac7e974dab3d1aa88db24194c102e759d909f35ba2807cfd17deb8d3b2f RLBA-2021:1660 tpm2-abrmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-abrmd, tpm2-abrmd-selinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b RLEA-2021:1673 crda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b RLBA-2021:1681 vhostmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vhostmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms vm-dump-metrics-1.1-5.el8.x86_64.rpm d5a7b53ed53d2503d818049c5fb561377cd5f1ace739beba335ce48dd1d1ab98 vm-dump-metrics-devel-1.1-5.el8.x86_64.rpm a5b11669af8695899b18d1e6afb7b6611bbd4e48daab04f17f56de6f94cef8dd RLBA-2021:1687 dejavu-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dejavu-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 RLBA-2021:1689 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo, librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms librhsm-0.0.3-4.el8.x86_64.rpm e4f0012ac340a8aed1beec50849c7bc34371b3d24ce309fa7aee53ed9174a9e4 RLBA-2021:1691 iptraf-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptraf-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iptraf-ng-1.2.1-2.el8.x86_64.rpm f9cde3158fcb23d84e78d04b3a5096aac4cd663ec575abbd9f8193c5c96b0cc9 RLBA-2021:1696 intel-cmt-cat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for intel-cmt-cat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms intel-cmt-cat-4.0.0-0.el8.x86_64.rpm 05fbb612d67a4d61e6d901f5d8b3e8f3c3361db07e0f52f8cc210546d7f7fe81 RLBA-2021:1698 python-ply bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ply. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 RLBA-2021:1699 crontabs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crontabs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 RLSA-2021:1702 Moderate: brotli security update Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for brotli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms brotli-1.0.6-3.el8.x86_64.rpm f846cb5edaec93436789fe3316a715d5a756aa49c8b40b2fb8f681e7aecbaa75 RLEA-2021:1707 bolt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bolt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bolt-0.9.1-1.el8.x86_64.rpm 82534e4daf0aa98f655c94d4a17647c6a7b60d5c38b85e0489dcb068cbbaa687 RLBA-2021:1709 popt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for popt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms popt-1.18-1.el8.x86_64.rpm 5d98fd70ff26cbe70d7aad9284c670b45eba929720af926195951259d7f32484 popt-devel-1.18-1.el8.x86_64.rpm bde242a3b19bdb49aee62adc4476c50fe96f25d353f51b116de6c5540bb6ccc7 RLBA-2021:1710 dlm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dlm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dlm-lib-4.1.0-1.el8.x86_64.rpm 40c70647d26d0c291fca3f735ff9547274bdba2770d5b50fbcb61d6b2c10d6bf RLEA-2021:1712 libpcap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libpcap-1.9.1-5.el8.x86_64.rpm 5dc7df40d3f6df0f4e3917763e27e9d7c4e5e8be23e05ac19c592e0357a3c6cb RLEA-2021:1720 ima-evm-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ima-evm-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ima-evm-utils0-1.3.2-12.el8.x86_64.rpm 3351a219037ab601a2d699d120fe2217c788e6335facd6c38a6f18c2dab9aedf ima-evm-utils-1.3.2-12.el8.x86_64.rpm 3eb4c27783d75c704fdf237704de6be746bda7cd987f8234ccf77dbe2ff8b0e9 RLBA-2021:1731 userspace-rcu bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for userspace-rcu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms userspace-rcu-0.10.1-4.el8.x86_64.rpm d7b32acc512ce9cceb8fbc21762930cd836b128d718ca4755a3e2e2c06a620d4 RLBA-2021:1732 squashfs-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for squashfs-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms squashfs-tools-4.3-20.el8.x86_64.rpm 722139c23a9e1471495be553a92e712663cd62cedc5f5f1e6aae0f1cc862046e RLSA-2021:2575 Moderate: lz4 security update The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems. Security Fix(es): * lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for lz4. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems. Security Fix(es): * lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms lz4-1.8.3-3.el8_4.x86_64.rpm e74ca5fb78b28ff0c60bfdee2afdc2f3a23aac1da30dbf52c28f92e576542278 lz4-devel-1.8.3-3.el8_4.x86_64.rpm 15e64b28e17640ad880eae7dcac02406ffb01ef9691d8f8de44f232717bc94e7 lz4-libs-1.8.3-3.el8_4.x86_64.rpm cf76cb56e26c49ceed4d164973aaf69406111ecb9f93e15c4ee700522a0a9757 RLBA-2021:3049 pcsc-lite bug fix and enhancement update PC/SC Lite provides a Windows SCard compatible interface for communicating with smart cards, smart card readers, and other security tokens. Bug Fixes: * Increase global reader array size to 48 to address issue with RHCS secure channel creation (BZ#1972569) * Increase global reader array size to 48 to address issue with RHCS secure channel creation (pcsc-lite-ccid) (BZ#1973405) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite-ccid, pcsc-lite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PC/SC Lite provides a Windows SCard compatible interface for communicating with smart cards, smart card readers, and other security tokens. Bug Fixes: * Increase global reader array size to 48 to address issue with RHCS secure channel creation (BZ#1972569) * Increase global reader array size to 48 to address issue with RHCS secure channel creation (pcsc-lite-ccid) (BZ#1973405) rocky-linux-8-x86-64-baseos-rpms pcsc-lite-ccid-1.4.29-5.1.el8_4.x86_64.rpm aba4eda22537cf9f3182593fc6ef43d3ac218cc095949016a0eb998dce853828 RLBA-2021:3594 libdb bug fix and enhancement update The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) rocky-linux-8-x86-64-baseos-rpms libdb-5.3.28-42.el8_4.x86_64.rpm e120f803a572ad17c97a147a445b277ab4da0c8dc3055d8177e2e4a5d5c21443 libdb-utils-5.3.28-42.el8_4.x86_64.rpm 8dd3d399f5155f38d32d28f267aadcbb6cf82de9f3f31748bb0bb046e8535b74 RLBA-2021:4353 lm_sensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lm_sensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms lm_sensors-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm 5fbf858b3602ccbcac70ce6100533fccd03f2a90e3490ac178771db0ff09a7fc lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm 44311bbcaa8d84aaa563892234bb315039e9bd3f6b48362c7bb670005d2b540e lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm 5fa5a3bef7d33ed5016011ba6d56f79f67f28b7975edbae2d85dc7f38c9b0fdd RLBA-2021:4354 libndp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libndp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libndp-1.7-6.el8.x86_64.rpm c5f6db3d2900eff8aee15514e5519f34c07950b9b1b0989eb0a43a9f1a7ec52b RLBA-2021:4363 gfs2-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gfs2-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gfs2-utils-3.2.0-11.el8.x86_64.rpm 3941e1e57372dc8d506a46f1dd5b7fed57ed21a207957cd5ed9c34203533027a RLBA-2021:4371 libxcrypt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libxcrypt-4.1.1-6.el8.x86_64.rpm da47347fe8c12a83da4b3dc141396172f82cde14530b7746b2c0882651f1a468 libxcrypt-devel-4.1.1-6.el8.x86_64.rpm 71242b7ce34cbadc0eb117e4608887ddd64236e7e808fb593f9b3d7cccdcbc40 RLSA-2021:4373 Low: pcre security update PCRE is a Perl-compatible regular expression library. Security Fix(es): * pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838) * pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pcre. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PCRE is a Perl-compatible regular expression library. Security Fix(es): * pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838) * pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms pcre-8.42-6.el8.x86_64.rpm 0c64dc4099b1af3af95760d573660c792e6df7a68eb5f45f7fdd5b1f5d2879fa pcre-cpp-8.42-6.el8.x86_64.rpm e23bf040432a3b44b439d5901152bf64e04fca000f521f6b77ef76d7162b7485 pcre-devel-8.42-6.el8.x86_64.rpm ac5874c0838cee6599d1b8945bee116857f3ebb445ea0c9453bb0aefe386f1c6 pcre-utf16-8.42-6.el8.x86_64.rpm 42f4dfe51d519b6eaaf0626a562dd2f2403fe13e0d3eaee4d6c1e5d4da26dd89 pcre-utf32-8.42-6.el8.x86_64.rpm ea60d759ffef7c5a8556fe94a745db713769b813ca31ac9995e171ad3dc84563 RLBA-2021:4377 quota bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for quota. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms quota-4.04-14.el8.x86_64.rpm 42cfc13ec40dff5cc57d8dfde98c9b4a9715a3ded7a66997857d960cb6ab0b36 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-nld-4.04-14.el8.x86_64.rpm 781fa685aed427ecd46644f9dcb9de1f0001bc38e4c54d77094ffd236904e46e quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-rpc-4.04-14.el8.x86_64.rpm 19bffbeadf9050e05d918ee518fb991f31ad4cfa5f86ea8974200b7f8f53d0be quota-warnquota-4.04-14.el8.x86_64.rpm 657bd785cf526d0b1b9d5da8d0f64da4cc39ce00698702b01885c0dd80240ffd RLBA-2021:4379 watchdog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for watchdog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms watchdog-5.15-2.el8.x86_64.rpm 612e8baade6a563487c128316ed541ba2f99459d8f40ecb3c10c439c63ceb142 RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gsettings-desktop-schemas-3.32.0-6.el8.x86_64.rpm ef0bee544ec9f62c9d8746d753fdbef129a1d5a1d94c19cc503d69396239c57a RLBA-2021:4383 nvmetcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvmetcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 RLBA-2021:4397 logwatch bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for logwatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 RLEA-2021:4405 libmodulemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libmodulemd1-1.8.16-0.2.13.0.1.x86_64.rpm 791de2a73652210cf934938ed23743fe9c57039be70ebc9c11cdd5d47288050b libmodulemd-2.13.0-1.el8.x86_64.rpm 0298da65634ed07cd6641dc0b56a63e437597cc5632a71645a00b8cec036a7de RLBA-2021:4406 numactl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms numactl-2.0.12-13.el8.x86_64.rpm f35d143255025717a8c38c8eb94a74cc198a6d38be89b3cf542ef5c17b4f017c numactl-devel-2.0.12-13.el8.x86_64.rpm 7cd411111dc352df3e571b12ca0c462e4fb149280bf3ff6f0c7d06d68c7c57d8 numactl-libs-2.0.12-13.el8.x86_64.rpm 47219636d1d240e8ab5a55ac2f52160dc79a3c36347c7331870d79e3fbb11069 RLBA-2021:4411 tpm2-tss bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tpm2-tss-2.3.2-4.el8.x86_64.rpm d8a2682594c9cf11b6d0561ad3cd77e3c10bcca1c845e08b552ef689e300e11b tpm2-tss-devel-2.3.2-4.el8.x86_64.rpm 40ee98fb00e7230eb141e2f19b37cbf1932598c6e158f2b7665b863f4c7a3cc1 RLBA-2021:4412 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms opensm-3.3.24-1.el8.x86_64.rpm 6d8802477c76749b1a39e38cdf98d861e093d275d32e48f44919509c531cb44b opensm-libs-3.3.24-1.el8.x86_64.rpm 76ae7bf9dc394388d177fe4b319e3d35e99926b0e3acbb9b2ac6313140de7231 opa-fm-10.11.0.2.1-1.el8.rocky.x86_64.rpm e750e63c2625f670d507b56dffb5c064fd8c909f4bc2b78cfcc896c52a76f8d0 perftest-4.5-12.el8.x86_64.rpm 9ed6fb66f98e8716a208a58fc6a7c48cc26acf962319aae6f68e336cd1f4e258 RLSA-2021:4413 Moderate: tpm2-tools security and enhancement update The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space. Security Fix(es): * tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tpm2-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space. Security Fix(es): * tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tpm2-tools-4.1.1-5.el8.x86_64.rpm 56641449ac2b9486586450eb5edd7ba1e80c42e2b4e327cf92d3225541264148 RLBA-2021:4421 hdparm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hdparm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms hdparm-9.54-4.el8.x86_64.rpm b697f45bdac88f22ec4926f770a10e09e7283a5c4adfda0c82e083c4ddda2fea RLSA-2021:4426 Moderate: ncurses security update The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594) * ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ncurses. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594) * ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ncurses-6.1-9.20180224.el8.x86_64.rpm 01e479a8932454ca746744cbf6dcf006e48ff702773014a690ee9e56f9a6cf5f ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-c++-libs-6.1-9.20180224.el8.x86_64.rpm 6ab0bd138fe730716f2d4c790d1e9249239499b6ec32f2a695f55da3c6430548 ncurses-compat-libs-6.1-9.20180224.el8.x86_64.rpm 66cf17688b5930da19e3a435d23dee553644f0830ed0df61fa26562d5f4b866c ncurses-devel-6.1-9.20180224.el8.x86_64.rpm 96cd5a3383ee4bec20ec57897de0034734df9356852b8c7c118c10bcdf3f20b1 ncurses-libs-6.1-9.20180224.el8.x86_64.rpm f127eaa596a0e10a031502ffbe4fec8c80c649c645dca6dbb73109f1e4989df8 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 RLEA-2021:4434 libcap-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libcap-ng-0.7.11-1.el8.x86_64.rpm 761a00cbdad22fc3d308ce6e49aa3b3909cd2a8b93794da53ea74344a280cde5 libcap-ng-devel-0.7.11-1.el8.x86_64.rpm 9351a96d4320814185fb5336a2fe41bfd676f655acdf3aa070c964dd8e74acd0 libcap-ng-python3-0.7.11-1.el8.x86_64.rpm f6c28c27eb7a3eb39189fe66a67a9ce21fa41c120debd14c887f5226e6546211 libcap-ng-utils-0.7.11-1.el8.x86_64.rpm e9967d25b3802010113e075ee0b603205fc87d40a2bd6b69faf151adcabe06c4 RLBA-2021:4441 microdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms microdnf-3.8.0-2.el8.x86_64.rpm 288566726f311e55eb6b8c7a39d17aed661013737d721c45f7e30f5bc96cf7c3 RLBA-2021:4442 lshw bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lshw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms lshw-B.02.19.2-6.el8.x86_64.rpm 836ee14696e219b86ab54380c32fcbb7cdc82922ebbd9b59a731feb39fe4d4a0 RLBA-2021:4443 python-cryptography bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-cryptography-3.2.1-5.el8.x86_64.rpm fb7a8e1faf38e78cb0f94d07498fa5e7523a97665194d7a10b3ef52cd744ec23 RLBA-2021:4445 fcoe-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fcoe-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms fcoe-utils-1.0.33-4.git848bcc6.el8.x86_64.rpm a9e9b5a53f45e07d1b13a6e387413acb5cb973aa2cb716377f7966c234a178e3 RLBA-2021:4446 iscsi-initiator-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm 8f57c01418ad5e5c667a5c631e78cbcb6ef8f6333b725bce6fd4c3925577d5ba iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.x86_64.rpm 424ff81a306bf519932fd557edc599a1fff9924068918e26aa3d1a440754874e python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm cfca39fb448a475d7fd860860691a4ed8974509754f25ffb6bfdca8828230aad RLBA-2021:4449 openldap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms openldap-2.4.46-18.el8.x86_64.rpm 4ddf1d24486b18daa6b9e2afff10966dc033fba8a08df7714d41d0db5a1f4981 openldap-clients-2.4.46-18.el8.x86_64.rpm 0c3f582752ac772216a51855cfcbd2a18511a2fe5bb69b44c5f2428daf1f26e5 openldap-devel-2.4.46-18.el8.x86_64.rpm 6444c3ce8decbf6e902c02ad8d83c191b6118a4be5f2e7dae6fdbccb384d7654 RLEA-2021:4450 tss2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tss2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tss2-1.6.0-1.el8.x86_64.rpm c9fc268ee1facd5163bf0daa7a4c7a5ce47d13b073b7a837d301acaa084fcc78 RLSA-2021:4451 Moderate: gnutls and nettle security, bug fix, and enhancement update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms nettle-3.4.1-7.el8.x86_64.rpm 1c462fc46745eb337edf14bc05b508d7cc5cf109c15d8ec0981ba29b3fba779e RLBA-2021:4453 adcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms adcli-0.8.2-12.el8.x86_64.rpm da4f2cb54f668f1f4cb3683f627574c788a12ab68ab8163abfa719ebe840829b adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 RLBA-2021:4454 keyutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keyutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms keyutils-1.5.10-9.el8.x86_64.rpm 28a9cdd2360e30d389fa72f66f073029fd9475b7af4363d8fd0f0e664702ff15 keyutils-libs-1.5.10-9.el8.x86_64.rpm f44103f68ed2718427d03edb4a0ebdf187ca12bcb13024b9b88a7e7f802ba95c keyutils-libs-devel-1.5.10-9.el8.x86_64.rpm fb29a6347fefd64bd276f37a7fd7e6bbea545648f6f07ad15f0acd94e8988b99 RLBA-2021:4456 boom-boot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boom-boot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 RLBA-2021:4461 filesystem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for filesystem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms filesystem-3.8-6.el8.x86_64.rpm a620c8dc9acec25088fa83a1061bbda6d391dd1aab36b9eed75144d5d4caf8d7 RLBA-2021:4470 man-db bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-db. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms man-db-2.7.6.1-18.el8.x86_64.rpm 8037a0a1e22a3558f4d1ed8d1fff0daba12f79bfb3935885957624e53def1c96 man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 RLBA-2021:4475 freeipmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms freeipmi-1.6.8-1.el8.x86_64.rpm b462ee869a627f2e094660fa1acfbc15a2d7de108b72703ba2333163eb01d44a freeipmi-bmc-watchdog-1.6.8-1.el8.x86_64.rpm 0cd6c7fc163ba44d532f203e63deadfed53b0bd5c36a624c48e12ea000cb7b79 freeipmi-ipmidetectd-1.6.8-1.el8.x86_64.rpm ea77762191a5170a7626ceaf6bebef127cc350068cfe466784fa54f9da2781fc freeipmi-ipmiseld-1.6.8-1.el8.x86_64.rpm 5b10807bf9e626ff8edb33bb18942986187ae61fb182d977986f38cdd62bca46 RLBA-2021:4477 parted bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for parted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms parted-3.2-39.el8.x86_64.rpm 439db5265bdff61a577ba4cb29f729d6abe868cf3b9a77818e38bcf77f1e7bbb RLBA-2021:4483 OpenIPMI bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for OpenIPMI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms OpenIPMI-2.0.31-3.el8.x86_64.rpm 905a03c8cbe871b46f09ec36eefa39c8e5ed578379150019b91cc5769f7dd1b8 OpenIPMI-lanserv-2.0.31-3.el8.x86_64.rpm 857b502b8c297df355b755b6cb377f7f67606c9da0cb41efa8f05f8cd739b8dd OpenIPMI-libs-2.0.31-3.el8.x86_64.rpm 298e426b4ea7ff819988bc6b92f5a3ae4b22b519cdd709e2f6fb3eeec6c6708e OpenIPMI-perl-2.0.31-3.el8.x86_64.rpm 6bd9f4ae7d4b653181f031438ece41b47e01179470e157f0938b66ee0f10122b python3-openipmi-2.0.31-3.el8.x86_64.rpm 4bfaa5bcfd1d2071aa57763018f53f4b22a81cb4f1333251ee7d6d34b8ae68ec RLEA-2021:4488 hwloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms compat-hwloc1-2.2.0-3.el8.x86_64.rpm 4db3b7ecc22503683fbb9c536676c01698c909429d55a05d82db0790066f8964 hwloc-2.2.0-3.el8.x86_64.rpm 47ae43c5691e6c25f41be31d3728ba91b7542fbfa10cf727d583797453b8609a hwloc-libs-2.2.0-3.el8.x86_64.rpm 5f77d199898d6588e5de9de8330435897cfbeb4bf6d49dcdfc42a5d60f0370f4 RLBA-2021:4496 chkconfig bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chkconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms chkconfig-1.19.1-1.el8.x86_64.rpm effd7e19baa0b24202b93ffa280ebd988f85b6d4defe02dc65741cf796fe2ef9 ntsysv-1.19.1-1.el8.x86_64.rpm 87f06924896c64dd178b8b58614cf539d4c9c07a772adaadc829f0fc55c39a63 RLBA-2021:4501 emacs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 RLBA-2021:4505 mobile-broadband-provider-info bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mobile-broadband-provider-info. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 RLBA-2021:4507 fontconfig bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fontconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms fontconfig-2.13.1-4.el8.x86_64.rpm 6f8bbe7f9c22003405031deeb18ef38815d8dd4935b8766f711ac8abff276601 fontconfig-devel-2.13.1-4.el8.x86_64.rpm 9f929477ca4e71bc79eada7ad1582ae756583bc93a71f45530b3bb6c9323b35a RLBA-2021:4508 lsscsi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lsscsi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms lsscsi-0.32-3.el8.x86_64.rpm f7e207e75cbba89966d772221f9556d3be6be0c88f9bf0af14454dd882f03c83 RLSA-2021:4510 Low: lua security update The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms lua-libs-5.3.4-12.el8.x86_64.rpm 62661a4dd553c29e9200d6319490be62d969c4f4620b9f2134a26652c394fcf7 RLBA-2021:4512 os-prober bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for os-prober. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms os-prober-1.74-9.el8.x86_64.rpm 6fbe666c544e2e3abd3fa5e4e77c8e5e486d7e60f7df881f20c3aeb47114f820 RLSA-2021:4513 Moderate: libsepol security update The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) * libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) * libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsepol. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) * libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) * libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libsepol-2.9-3.el8.x86_64.rpm cc017c27e60d9f6d83db9d6828cad89b804d9f50476d88b23e0cd7a69b58f107 libsepol-devel-2.9-3.el8.x86_64.rpm 400722a407b15af596c530a7d7f83c429e2577337e56ca93c711ad94ca6155e6 RLBA-2021:4516 usermode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usermode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms usermode-1.113-2.el8.x86_64.rpm 29b88838a20e0f5fadb80ce7009a9257d3350713139ca34b9d214dc725ae3816 RLSA-2022:0658 Important: cyrus-sasl security update The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cyrus-sasl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms cyrus-sasl-2.1.27-6.el8_5.x86_64.rpm 1824f614aabcebda0254792e6c680f2a333c96393b85d761cf36b5f73cfbd925 cyrus-sasl-devel-2.1.27-6.el8_5.x86_64.rpm 12774e67b410fd7bbc122de9178359e4fed83cc2d8e6c81c0e8e6898e045ee07 cyrus-sasl-gs2-2.1.27-6.el8_5.x86_64.rpm a9572e38d0da5779a76a655b8dce56eb1d09febdef5568c60ae78f0de939f61c cyrus-sasl-gssapi-2.1.27-6.el8_5.x86_64.rpm f1ca7ec9c34e2947a5b8f1a49003e80beed83f009a7171faf3f1ee18dea1ec20 cyrus-sasl-ldap-2.1.27-6.el8_5.x86_64.rpm cc9470e5fe74e796847de97dc2cbfb3cbc4ef4cc98aacbbaacc47329b9192de8 cyrus-sasl-lib-2.1.27-6.el8_5.x86_64.rpm b1a98c3128e57243d2ce7212ced1d8676d4196feac16079e6335413a0b57ca41 cyrus-sasl-md5-2.1.27-6.el8_5.x86_64.rpm 8ba490ac54ffd96a57f7bda6801e0920a8ba037d8f031561716a9e27b97e0d58 cyrus-sasl-ntlm-2.1.27-6.el8_5.x86_64.rpm f0b7feee34ff86b9bf14eeab92bb67eac1a6d46e556b128d024b532ec2cb9a63 cyrus-sasl-plain-2.1.27-6.el8_5.x86_64.rpm b9e078abe6846f0952cdcfa56d8ca59777c5eedcfb9de265976fca5641917314 cyrus-sasl-scram-2.1.27-6.el8_5.x86_64.rpm 4de03983aa0fa20aa19198fa463e79df8d6e20f5a83468dc4eaeeede24317bf9 RLSA-2022:1537 Important: gzip security update The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms gzip-1.9-13.el8_5.x86_64.rpm 722d8e039199d9e37b996c2734a0e0d0f2032a6247616a2f94e8316eec824c53 RLSA-2022:1546 Moderate: polkit security update The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms polkit-0.115-13.el8_5.2.x86_64.rpm abcb39e61f976ae105945d9c4c3a49e47a770f376166b99a4ab62b865b78fd0a polkit-devel-0.115-13.el8_5.2.x86_64.rpm 95b52462567c23a6fb021dd1270897720fdb969e424003968639e7d3effb22ff polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-libs-0.115-13.el8_5.2.x86_64.rpm c05c27b9fe820d2fd9d0f9ebc047255ff79f825af58416538d0fec5e05862377 RLEA-2022:1954 perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLEA-2022:1956 perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLSA-2022:1991 Moderate: cpio security update The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Security Fix(es): * cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cpio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Security Fix(es): * cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cpio-2.12-11.el8.x86_64.rpm af69fa87dc89d44217a405f35f576fc71f60f932ce0b0f99710b743ab5a06e19 RLEA-2022:2014 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libpsm2-11.2.206-1.el8.x86_64.rpm fd41dd241b6df797440851404cae412b154222804103fcf7d4e0988429ce28a9 libpsm2-compat-11.2.206-1.el8.x86_64.rpm 2b9771d3cc67724a4480c8bed54be247c0dd72440e7d68ad85752518bf504416 perftest-4.5-12.el8.x86_64.rpm 9ed6fb66f98e8716a208a58fc6a7c48cc26acf962319aae6f68e336cd1f4e258 opa-address-resolution-10.11.0.2-1.el8.rocky.x86_64.rpm 6ad3c5b67707090e4c67a945e9fdddffb1e969587d0a9e8ab82fe20703ca43e9 opa-basic-tools-10.11.0.2-1.el8.rocky.x86_64.rpm 596755140a07d757e3eee7a08fc19c314d595621aee00f504bfcf2bfda34aab4 opa-fastfabric-10.11.0.2-1.el8.rocky.x86_64.rpm 9f15a49bc53dfc5fbb77e88c81e7d7791bc49a7d5fbf1484b798f0d292ec1033 opa-libopamgt-10.11.0.2-1.el8.rocky.x86_64.rpm 4385856c1532a15511aa806df87b7af10de2b5a1c852fef51d00d686c5a58f6c RLBA-2022:2023 net-snmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms net-snmp-libs-5.8-25.el8.x86_64.rpm 4bfdd28a7b64e67372563781342f9858af6bb96e29a90102d1b6ef855fef7e59 RLBA-2022:2027 json-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms json-c-0.13.1-3.el8.x86_64.rpm 2315a2997fb8083935184ff0ad4bcec36554629d48eacf65f255493227d5d78a RLEA-2022:2029 libseccomp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libseccomp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libseccomp-2.5.2-1.el8.x86_64.rpm 59a9e248457a1cb695706b17d59bcf7d9bf4e1d84b010c9f309aca2ad9b520a7 RLBA-2022:2041 openhpi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openhpi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms openhpi-3.8.0-10.el8.x86_64.rpm 92bce82eff0c437be15590550995aaaac6dbbcf2d927a743b708231ed7e39bf2 openhpi-libs-3.8.0-10.el8.x86_64.rpm 013d425e3f0a724df07ffa4108518f3e848c71ffd001fea56c1d1a9c3c68752e RLBA-2022:2044 crypto-policies bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crypto-policies. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm 83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9 crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183 RLBA-2022:2054 libffi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libffi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libffi-3.1-23.el8.x86_64.rpm cb6a8d322dc6ffe55e467e38a3d44e36b90a46202cdce0ff5c3b43b571a0435d libffi-devel-3.1-23.el8.x86_64.rpm 3dc050043ce500c8e2c88c62b114680804074becf8b6762dfa6c740f45ba86db RLBA-2022:2060 kmod bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kmod-25-19.el8.x86_64.rpm 993d53503b870d0520f04183c8642ba2435fbd78d0dd44fbae4b1d3c05416ef1 kmod-libs-25-19.el8.x86_64.rpm b89b400448003842e40d7252320ed56d1750d52ae846ac04090169e38fb0f654 RLBA-2022:2062 wpa_supplicant bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wpa_supplicant. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms wpa_supplicant-2.10-1.el8.x86_64.rpm b977eeb1c8f154074885ef1b0619e78e1c983297a8e4b54f5c9a43c065235cd8 RLBA-2022:2080 sudo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms sudo-1.8.29-8.el8.x86_64.rpm f1522f7aa2ff37703c155ad8d9294e852c26b3b7850826c5b425a19005ce003f RLBA-2022:2098 unzip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms unzip-6.0-46.el8.x86_64.rpm 78baf2fdbfeb4c02602777e90332b30bfb48e5d0ec9909f32636f112e3b387a8 RLBA-2022:2111 ksc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ksc-1.9-2.el8.noarch.rpm 62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96 RLEA-2022:1869 new module: perl:5.32 This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLEA-2022:1955 perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.x86_64.rpm bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef RLEA-2022:1990 rasdaemon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rasdaemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms rasdaemon-0.6.1-12.el8.x86_64.rpm 12138e320f634bf5e6e484d88efe399b480d86910cd2afb932d63c4d901a9053 RLBA-2022:1994 libqmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libqmi-utils-1.30.2-1.el8.x86_64.rpm eecd04407c5d1586949310e632fd73d087314f69bc51647feb8e98632456e6f3 libqmi-1.30.2-1.el8.x86_64.rpm 08e634c829db38d7046203c675cbb312cf10d415c307fb25cdb368cfa575a524 RLBA-2022:1996 sed bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sed. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms sed-4.5-5.el8.x86_64.rpm c2cb6b22bd39a3579cfb66473246c707e3a8e390c76da085ac10102cd4b8d2dc RLBA-2022:1997 libmbim bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmbim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libmbim-1.26.0-2.el8.x86_64.rpm f92083fa1b48fe3753fbef2b280efe6446507abf8135d02adef403a53db54b30 libmbim-utils-1.26.0-2.el8.x86_64.rpm 1fb547ae3076fbafb6570f1e86d575da61e2fb6132665ac5e63e6b9989bbb9e9 RLBA-2022:1999 trace-cmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trace-cmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms trace-cmd-2.7-10.el8.x86_64.rpm faf2e0428b492c12598c0f6528bd1072645dbb9f6f80b42b8ec48c8b8c3b11e7 RLBA-2022:2009 ModemManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ModemManager-1.18.2-1.el8.x86_64.rpm 2c0e215653ed6a1a318702d5db010edaa432bdd3dc844979482f54d0422f0252 ModemManager-glib-1.18.2-1.el8.x86_64.rpm 27d9fc6e5ebfb8375f67449526d5079da7e1d147f87c16cf2bc283cac45d75cc RLBA-2022:2015 make bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms make-4.2.1-11.el8.x86_64.rpm 4395686eb6662d9ce01e699cb55f34911f41fe6168437d47dc2c6f7738facb82 make-devel-4.2.1-11.el8.x86_64.rpm 4f67f87f7511d41bbd19656c77a42dc82f3c983194cb29cc230d10a394e83dfb RLBA-2022:2018 perl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-Errno-1.28-421.el8.x86_64.rpm cc31824dcec356f8675324cad83e2f265a265c1e2be885cab73159ca09875efe perl-interpreter-5.26.3-421.el8.x86_64.rpm bec31df2f08af18c21be0bd60119711e92ad116daa251d14d4945c19649c1a50 perl-IO-1.38-421.el8.x86_64.rpm bdd888c432876372ed76a6fb19bd6e65585a0be386e6ff3bc39de62b028224e2 perl-IO-Zlib-1.10-421.el8.noarch.rpm 087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25 perl-libs-5.26.3-421.el8.x86_64.rpm 4fe3aa630aa6c83402982a90c8f7373249d1c7566042bd52839855a138c90d1d perl-macros-5.26.3-421.el8.x86_64.rpm eafebd6e2eeb0cf52b78a258740686d284a545385477a65decfee06280fdf6c4 perl-Math-Complex-1.59-421.el8.noarch.rpm 8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a RLBA-2022:2024 ps_mem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ps_mem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ps_mem-3.6-9.el8.noarch.rpm 056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libssh-0.9.6-3.el8.x86_64.rpm edb9aa143d9ce74fde8721bb52d1070cb15624d5dc37d8c4fcb1b3ae79f90cf9 libssh-config-0.9.6-3.el8.noarch.rpm 24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549 RLBA-2022:2034 dmidecode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dmidecode-3.3-4.el8.x86_64.rpm 869937572d5563035b81c2b8f066a9d95d87c75ef86ccfa0c3c760f517497730 RLBA-2022:2035 libstoragemgmt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libstoragemgmt-1.9.1-3.el8.x86_64.rpm 6e116afef1c670aac97eea6f6e23f462f8fc46a1aeb7ea7e38e881686a9f7cc0 libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm 4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm 3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559 libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23 libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm 59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2 libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm 9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb libstoragemgmt-udev-1.9.1-3.el8.x86_64.rpm e42d6a4c33400b418ba52191ac5bc83b32f84df1453f0d2d7d8d67c4cdccc42d python3-libstoragemgmt-1.9.1-3.el8.x86_64.rpm 597dac643cc3f9a8e2bc1ee0abf20d2f51c855be4be37239879428a62b6a981d RLBA-2022:2040 libuser bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libuser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libuser-0.62-24.el8.x86_64.rpm 0b823bb3ef2134dd65c637f59f19a4450493608944d6a134134d300ca3091518 python3-libuser-0.62-24.el8.x86_64.rpm 6da85d54ab4e8585e00ee6c75aac5c76e11102e1ef661ac2ebcbf91a13c349b0 RLSA-2022:2043 Moderate: c-ares security update The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms c-ares-1.13.0-6.el8.x86_64.rpm b20639806dc6c4f8e1dfe4a820dc5e23fd7c5dc5219fa081084495a52b7a0be5 c-ares-devel-1.13.0-6.el8.x86_64.rpm 1aa23786260a27810c9036cafaa63db30daf1a6173224e7c62c7187887fe7b87 RLBA-2022:2046 libcomps bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcomps. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libcomps-0.1.18-1.el8.x86_64.rpm 1f30b68b60b65cad2a49710f181f736cf3b430ea77737c7f44bd3a6f871a012c python3-libcomps-0.1.18-1.el8.x86_64.rpm 370c4134cbb63e2f60d8f893e6f5b432d165efff8d142eaef11d0dfed6410259 RLBA-2022:2061 jansson bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jansson. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms jansson-2.14-1.el8.x86_64.rpm ec4abca99b96acd29c05cb39c5eb15c7e01827c5e8aeda51f24bc8f93869cd20 RLBA-2022:2064 python-linux-procfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-linux-procfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-linux-procfs-0.7.0-1.el8.noarch.rpm 4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4 RLBA-2022:2063 firewalld bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms firewalld-0.9.3-13.el8.noarch.rpm 94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8 firewalld-filesystem-0.9.3-13.el8.noarch.rpm 9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0 python3-firewall-0.9.3-13.el8.noarch.rpm c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5 RLBA-2022:2073 numatop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numatop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms numatop-2.2-1.el8.x86_64.rpm 27551e647791ad0d2489198c889fbcaf0ac7647cf912e6a9f102f3aa68fedd5e RLBA-2022:2078 xfsprogs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms xfsprogs-5.0.0-10.el8.x86_64.rpm 7388b2eeaff6394491d86ee0437dee3d5bafba18a1c8a16746fe0fbedfa044a7 xfsprogs-devel-5.0.0-10.el8.x86_64.rpm cbdba1a641ea361706fd28907e65cf4b332ab79c9e42ebae3f4b3a1e1b29deb0 RLBA-2022:2079 setools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-setools-4.3.0-3.el8.x86_64.rpm e84dc85b119f8efec0b501e1896cc60034d3bd42cd0ef338e91fc171098d791b setools-console-4.3.0-3.el8.x86_64.rpm b7718d0a442b5723a67b843658617260d0aa2e006d025b9b64599384be6c9a12 RLBA-2022:2088 realmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms realmd-0.16.3-25.el8.x86_64.rpm be9e94b0434768dbde4ad1b515ac3372f1ad61dba6d72daf933e24608c849f17 RLBA-2022:2089 pcsc-lite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms pcsc-lite-1.9.5-1.el8.x86_64.rpm 974a99a1f82e704f3bd74acc31597aab59b4baf577ac26a303809397b0e9d650 pcsc-lite-doc-1.9.5-1.el8.noarch.rpm 45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1 pcsc-lite-libs-1.9.5-1.el8.x86_64.rpm 4aca2f42fc7a5b25551773fd7980a84532f266d78fe51e7d4cf21d679efa7c9c RLBA-2022:2091 postfix bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms postfix-3.5.8-4.el8.x86_64.rpm f3b882060764a7a390827c851321d15870b7bc5c1e43724c4b88fb821c3e6896 RLBA-2022:2095 python-ethtool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-ethtool-0.14-5.el8.x86_64.rpm e5ee50deedd5f4b6732eb3c6dc748d53bbc75884113c1d6068a3d64466baf116 RLBA-2022:2097 cryptsetup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cryptsetup-2.3.7-2.el8.x86_64.rpm b3909ed466ac218d9c4e80570cb4e900d61840f90f9fd6874a3fa0a532064bb0 cryptsetup-libs-2.3.7-2.el8.x86_64.rpm f461ebe920b723756e580229360ed3f5eef77da45f6c5b817fbd6ef30ab87f35 cryptsetup-reencrypt-2.3.7-2.el8.x86_64.rpm 0ecf9e197e1984baca628627ffcfb00703b5ba704619a1afa38830d6fd375c3d integritysetup-2.3.7-2.el8.x86_64.rpm a574990faacfb486ca4e122658fe5f1fbb1a0707bf9cf09b384d8acc6455a289 veritysetup-2.3.7-2.el8.x86_64.rpm 8dd7bd38f9300f6a8c70df10f87094881f64e89b61513106bcb43b7c2cc81577 RLBA-2022:2099 sysfsutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysfsutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libsysfs-2.1.0-25.el8.x86_64.rpm 60f8b824cc526cb9467e6ff2ac668fc69699f47fb864299746ca598c28f6bcc1 RLBA-2022:2101 libnftnl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnftnl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libnftnl-1.1.5-5.el8.x86_64.rpm 6fb0df4498141297072db544857dc8e2602602ddc22bcfd70d4cc7b024954e1e RLBA-2022:2108 man-pages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-pages. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms man-pages-4.15-7.el8.x86_64.rpm a35a10d59443e40f372c23080debd9bcba27a121aa0c451269ef90c20ce7c919 RLBA-2022:2114 passwd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for passwd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms passwd-0.80-4.el8.x86_64.rpm 3a1cc71df31d247a8b30cdb8d67fac9662872a18bd2fc35b5e47c19c4d247b6c RLBA-2022:2115 xfsdump bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms xfsdump-3.1.8-4.el8.x86_64.rpm 9623db8bb5775351203aad158feae2e5d782ae3334b3def7e05aeee0bcd31376 RLBA-2022:2116 iotop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iotop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iotop-0.6-17.el8.noarch.rpm d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c RLBA-2022:2117 gpgme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gpgme-1.13.1-11.el8.x86_64.rpm 11fdb5b8e04134f2210b500f145045a539cc5ad41c0723d4db6fb4c9c680abcb gpgmepp-1.13.1-11.el8.x86_64.rpm d91a46e5c7334733b8f14167f7cdd1ff8134a0fd3fa0714422b0cd3f853eb822 python3-gpg-1.13.1-11.el8.x86_64.rpm 73263b50db0e92731cbde2df8d2f25133768e83cab55ddd3dad553a956f16c14 RLBA-2022:2118 texinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms info-6.5-7.el8.x86_64.rpm c265d03dabac183ae107c4b597a36776ae2a551a55d8a0db360b82e671f415f9 RLBA-2022:2122 gawk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gawk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gawk-4.2.1-4.el8.x86_64.rpm d5bccd4f32a6d4f636edbebd6f1b6ca1db6e1f39f64daa86b2420f7d4cfde3db RLSA-2022:4991 Important: xz security update XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms xz-5.2.4-4.el8_6.x86_64.rpm d9d31369563ebeb477fe0d66ebd23afee0699de3e75e36fb818627602bc0aec4 xz-devel-5.2.4-4.el8_6.x86_64.rpm 036eb5ff9a127bec82b64e921acf7652568a9c844280ac383355fef6a9757e39 xz-libs-5.2.4-4.el8_6.x86_64.rpm 283e7ac93ffee0cb93f33a991a9ab9f06a272caf88a6c56d17696ab1b2e83499 RLSA-2022:5095 Important: grub2, mokutil, shim, and shim-unsigned-x64 security update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) * grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695) * grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696) * grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697) * grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734) * grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735) * grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736) * shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for grub2, shim, shim-unsigned-x64, mokutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) * grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695) * grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696) * grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697) * grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734) * grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735) * grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736) * shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms shim-ia32-15.6-1.el8.x86_64.rpm d463aa1e1b24fab05ebe6babdd2cc572fecece224b0c535f8eae3ba4a3ada45a shim-x64-15.6-1.el8.x86_64.rpm 618ee485a8b845bd9675f29f82889c67de2ed94a000c83a8bbfc32b7ca614fca RLSA-2022:5311 Moderate: libgcrypt security update The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libgcrypt-1.8.5-7.el8_6.x86_64.rpm 6b782e29090507e3f1fd79353603d52744fc853c3bf73be705ba63172fad0731 libgcrypt-devel-1.8.5-7.el8_6.x86_64.rpm bb9ae61c1c94686a1b9c2d4d418807366f5ef338294517d9dd5e06576f120a30 RLBA-2022:5322 mtools bug fix and enhancement update Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks. Bug Fix(es) and Enhancement(s): * mtools missing glibc-gconv-extra dependency (BZ#2080999) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks. Bug Fix(es) and Enhancement(s): * mtools missing glibc-gconv-extra dependency (BZ#2080999) rocky-linux-8-x86-64-baseos-rpms mtools-4.0.18-15.el8_6.x86_64.rpm bf5055629fdf5b719b73a142d97ec837af4e244df5f6c3fec9df9bf1a72907cd RLSA-2022:5809 Moderate: pcre2 security update The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pcre2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms pcre2-10.32-3.el8_6.x86_64.rpm e01ba987cd81213935bca06b96ec8642a6ee178c178a5df8201c8e13f3b1d87b pcre2-devel-10.32-3.el8_6.x86_64.rpm d58c0c401b375e10407d9fcbebe8679e80b2516b7f908d6449918b7cb5438a8b pcre2-utf16-10.32-3.el8_6.x86_64.rpm c511a9117b37286f7ebd254274183db7767b0236aec16dffbd3f804817e6530e pcre2-utf32-10.32-3.el8_6.x86_64.rpm 1719080d13216247dae9316172cc19084bc72d380b2200a9ade012c10eb53ab1 RLSA-2022:5813 Moderate: vim security update Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms vim-minimal-8.0.1763-19.el8_6.4.x86_64.rpm cbb2c73d14f8a9ead6a438911d5475ae09ad25bcb99a24bee8f33d457b6ab4e8 RLBA-2022:5815 bash bug fix and enhancement update The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * Segfault in 'buffered_getchar()' function in bash (BZ#2097659) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * Segfault in 'buffered_getchar()' function in bash (BZ#2097659) rocky-linux-8-x86-64-baseos-rpms bash-4.4.20-4.el8_6.x86_64.rpm 75b11d7fde3783e41ec311542b43761cb996fb5f313f9b65c1172623ab66266d bash-doc-4.4.20-4.el8_6.x86_64.rpm 6833e28d4917f0fe330b2690f14be656d147f359098690d39d00a337430a934d RLSA-2022:5818 Moderate: openssl security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: c_rehash script allows command injection (CVE-2022-1292) * openssl: the c_rehash script allows command injection (CVE-2022-2068) * openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: c_rehash script allows command injection (CVE-2022-1292) * openssl: the c_rehash script allows command injection (CVE-2022-2068) * openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms openssl-1.1.1k-7.el8_6.x86_64.rpm 117d554d34f3312043180819b4b940fc7b2a4586d550f651877f9c5ff707a567 openssl-devel-1.1.1k-7.el8_6.x86_64.rpm aacf809def9c0c3c3a6124150db9922568480b8b569653ed69573de7a3a6d362 openssl-libs-1.1.1k-7.el8_6.x86_64.rpm 656d9fbf8647a3114dd94fca70bd29c0ae6b0115ee2536a6240910792ce731f4 openssl-perl-1.1.1k-7.el8_6.x86_64.rpm 01d37726fd1a705f88b69c8d146afedcb644eeffce8b88494d0a0e6d500e2230 RLBA-2022:6459 ca-certificates bug fix and enhancement update The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189) * QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462) * Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463) * ca-certificates need to add support for signing certs for .NET (BZ#2121485) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ca-certificates. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189) * QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462) * Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463) * ca-certificates need to add support for signing certs for .NET (BZ#2121485) rocky-linux-8-x86-64-baseos-rpms ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm 096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1 RLSA-2022:6463 Moderate: gnupg2 security update The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnupg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms gnupg2-2.2.20-3.el8_6.x86_64.rpm bcc8e48b2526be938285cf48185490822078c65153ada4d81633c83b4d4f9dc2 gnupg2-smime-2.2.20-3.el8_6.x86_64.rpm 48ec6bfa5de6c78331faf4ec66a1beff0141db2415a18fa74260f84d17b73f33 RLSA-2022:7089 Important: libksba security update KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libksba-1.3.5-8.el8_6.x86_64.rpm 2bd4934389b7e05c708630addefad4016826807e3008dc6398095c54cd7d78e7 RLSA-2022:7105 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms gnutls-3.6.16-5.el8_6.x86_64.rpm fef93f4e79e09dba85e23adf9e2103d8dbee735d0d02bf723d414ff94c5c2a85 RLBA-2022:7107 glib2 bug fix and enhancement update GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es) and Enhancement(s): * Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es) and Enhancement(s): * Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615) rocky-linux-8-x86-64-baseos-rpms glib2-2.56.4-158.el8_6.1.x86_64.rpm 61a796c05095a0c89ead008de79a522c0d50eff0d5870e7465fced706cf5d10b glib2-devel-2.56.4-158.el8_6.1.x86_64.rpm 69c0db06fbc8f2d68cd970a4e245dd7a541cdfdd4cf44e68b13b833e207e685c glib2-fam-2.56.4-158.el8_6.1.x86_64.rpm 4677c25392b7e27e30b0f125f412f6aac4266d9c5abe2ea35c276cd129389ebb glib2-tests-2.56.4-158.el8_6.1.x86_64.rpm 688e3e378b0c12adbd0b4d5771e65fc15090ca07f6f5a4807e08728d9dea06fa RLSA-2022:7108 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms sqlite-3.26.0-16.el8_6.x86_64.rpm d78914d48cdbbd003d8034e9859beaf3d4a3e12039c98eb3e80ed62ae5533e9e sqlite-devel-3.26.0-16.el8_6.x86_64.rpm 4320f53099ad9c1df90735bd288e271970e41aeaed143e5ebea0d3303c97fed4 sqlite-doc-3.26.0-16.el8_6.noarch.rpm c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d sqlite-libs-3.26.0-16.el8_6.x86_64.rpm 3183e68d7b7aac6cd39c3418b628b0d3905f0e25dd61b2637a60d24f16101f6e RLBA-2022:7115 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) rocky-linux-8-x86-64-baseos-rpms python3-rpm-4.14.3-24.el8_7.x86_64.rpm e1c16b79fce78de0cd225edb18baf4912ae103a4d1e4427ba48545f1e1442b7b rpm-4.14.3-24.el8_7.x86_64.rpm 52ddb09b53c7fe658f11a5353fc090dace91285ec842e39a64d6e08627b2b278 rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-build-libs-4.14.3-24.el8_7.x86_64.rpm 145ebac4456a0cd149537054ea74e323fd9eca548f38a40bd1725ac4eb9fb288 rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-devel-4.14.3-24.el8_7.x86_64.rpm 8be76765b51d8681a9f76b209d07847c27b338fe25af2b0a149502ce5b5424b8 rpm-libs-4.14.3-24.el8_7.x86_64.rpm fc4263ea61b68b93eda32fcde2612fea4537286f1e7e56fdd94db8eaae7faf8d rpm-plugin-ima-4.14.3-24.el8_7.x86_64.rpm e51a248c3608b07034f31451235312ce267e10c465585cbe633f900ddee1b0c8 rpm-plugin-prioreset-4.14.3-24.el8_7.x86_64.rpm 7eef6d9114e98909f304c2283325fc84afa6a3e22c794537eada9d1d164b53ae rpm-plugin-selinux-4.14.3-24.el8_7.x86_64.rpm 0d071d4c4a26203c48961cbeb02d2b9c5b050e29d31c36cc9e11769c50c9cf85 rpm-plugin-syslog-4.14.3-24.el8_7.x86_64.rpm 2d4cb5df2e4c19d3a4d59100777475e0e94bc1e7ddf0daf1b7c1503765621eb8 rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.x86_64.rpm ce1d5a7d9e8896e209eafb6142f22feaa70a2745e789a0b303e0dc8741fae778 rpm-sign-4.14.3-24.el8_7.x86_64.rpm 110d95fb5f5bf027f409ebe3ea455c1b3e387cde00645d970f5e716e92861e66 RLBA-2022:7116 libsemanage bug fix and enhancement update The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es) and Enhancement(s): * libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es) and Enhancement(s): * libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139) rocky-linux-8-x86-64-baseos-rpms libsemanage-2.9-9.el8.x86_64.rpm d08e18048af1c5ad125356edc17d805cdac32f33a1db756339d292ae3bc93428 python3-libsemanage-2.9-9.el8.x86_64.rpm 7f7c7f0b08535b082dd4a877324453f56f4f5d977982751e1c0843b41be90af3 RLBA-2022:7404 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-x86-64-baseos-rpms tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 RLBA-2022:7678 kmod-redhat-oracleasm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-redhat-oracleasm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kmod-redhat-oracleasm-2.0.8-15.el8.x86_64.rpm 44ac298ff3dec860dfc4aec171bcc9773a2e7ccbd205eb52988df8242d048bda RLBA-2022:7679 mcelog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mcelog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mcelog-180-0.el8.x86_64.rpm f327c50b3113ea5afe315a8a2457bbc3693dd30a3637dc2a49b47f267fbfa479 RLBA-2022:7681 audit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for audit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms audispd-plugins-3.0.7-4.el8.x86_64.rpm 4a01420e794d95d78d1681ee3cc731244d59d05d69bf47c0a00daa885b3703f4 audispd-plugins-zos-3.0.7-4.el8.x86_64.rpm a2394edcbf95d2127f1719cbaad685f9d60dc61703081bc7678b1afac11ed4cf audit-3.0.7-4.el8.x86_64.rpm 243ee8b827cde194a4c28936f3cd41ee8f448362a628d72a9265629baf90e80f audit-libs-3.0.7-4.el8.x86_64.rpm e804d60f2d5a31e4b10ae0a9a217ea66b7d2bf9e79249085d395d027e502e45e audit-libs-devel-3.0.7-4.el8.x86_64.rpm c43ffcb79cf5922fd4c6726c10a2943d16d736e590f27a3337acc933f815cbde python3-audit-3.0.7-4.el8.x86_64.rpm 53abac1b0e86b1a61dbce1e01aab3e25161e61682f2bcf0361834594b3da6009 RLBA-2022:7682 babeltrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for babeltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libbabeltrace-1.5.4-4.el8.x86_64.rpm 9e6e4064fb82bb163daeb5f230c4fd92917ba94d6e93fc366e769e7a7844e7ac RLSA-2022:7683 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Spectre-BHB (CVE-2022-23960) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Spectre-BHB (CVE-2022-23960) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-425.3.1.el8.x86_64.rpm 916f29290aa962dcb1cc0b509124b99e65808b6be88686ccbb3f42d082a953e9 kernel-4.18.0-425.3.1.el8.x86_64.rpm 2d1a07f77e08aa7ddcaf1244679c247666ba718cdb7dc5c612334b7868270d73 kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm 7502d39b6c6a1298db08b7e84273413b6cbe84299fd31cb2266e8d6711947bd9 kernel-core-4.18.0-425.3.1.el8.x86_64.rpm 4dad88a5fe11b6047eaf9df8654e981009add3a37ce5856c05fbaabb35ca2c6c kernel-cross-headers-4.18.0-425.3.1.el8.x86_64.rpm c7815511a07781124bdc76d483637d89fb66718b08fc66e0f861e4344c7c9de9 kernel-debug-4.18.0-425.3.1.el8.x86_64.rpm d466f697683b314f994d629ee2b45a9247d4591fca2429e599a8d78a9446d739 kernel-debug-core-4.18.0-425.3.1.el8.x86_64.rpm 422c13c018c3bfa6a871dbda188318e5fce776c1e4e081cd206393759474f7ca kernel-debug-devel-4.18.0-425.3.1.el8.x86_64.rpm b52028e57ae4b54af1cae536e844abc901f8ff7f4d96d4bde97798029e429bc4 kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64.rpm 308630b40996f4d9e7341c06eb1290af50ec0140ddfea07faf33a9ceebb81c8e kernel-debug-modules-4.18.0-425.3.1.el8.x86_64.rpm 13be95f8208e7b59876913fb9d3dcb622edb58d0b31fc873961499f0c7cd9c33 kernel-debug-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm fa5bc1ba0c1901232f912de3daf90213218251403024dee91fd7a353c987d2fe kernel-devel-4.18.0-425.3.1.el8.x86_64.rpm 942c23ac86e1284d69eb39639fb308a64859f479b6dac2df5ef48dc572bb2dd4 kernel-doc-4.18.0-425.3.1.el8.noarch.rpm dfd007ce8dc51176e8566453017d2319a2430dfea645a11ecddbfbf2d299aea0 kernel-headers-4.18.0-425.3.1.el8.x86_64.rpm dd41b9c3e90de98dd8775acceb96a13fcec98bfd00e9df9b67cf423d65ad8f0a kernel-modules-4.18.0-425.3.1.el8.x86_64.rpm 2776fb3ef33a3ca2976e27dfddc221f5c2ceb8b60dbb4cfb9569b5647e66fe80 kernel-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm d77c58049f6fef4a25e139e81f7eb12d8c1c076c592a7190d74e8a0f2f25d6bc kernel-tools-4.18.0-425.3.1.el8.x86_64.rpm 1b37dae1170690f617d0d8472d85d65ef1295b7f9b43a564e218a86de1475fba kernel-tools-libs-4.18.0-425.3.1.el8.x86_64.rpm 721a901d11711151aa87386b2f5fed06216b633e7dfd81782771b2608421309c perf-4.18.0-425.3.1.el8.x86_64.rpm 55cffef3484b3007e968bb294b6ca624c317c285fbd91d3d926ea094c136ecf2 python3-perf-4.18.0-425.3.1.el8.x86_64.rpm 3239cbb0136bf0cfc6d5b76ceae67864185eb63ac81a8ee924694348d7115b70 RLBA-2022:7684 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms glibc-2.28-211.el8.x86_64.rpm eaf25c824ccbf483d8e4c490eabd5036e7bcf578282071be8b03326291bd69e0 glibc-all-langpacks-2.28-211.el8.x86_64.rpm 137b9be34b103ac1b1a700dccb465e8662cddd6a4462264bae479b6beb0f7216 glibc-common-2.28-211.el8.x86_64.rpm 6825067b69302b5fe97e70fb65e049a24633790e5e02bb995a8825b06fa65904 glibc-devel-2.28-211.el8.x86_64.rpm cfd4273bccbdc53553c2d235e665034334a33c6e140c17f307f1ff2a721fdc50 glibc-doc-2.28-211.el8.noarch.rpm 651c1bcdd3292c68b98e3f102ea239fa39a639f17539d011589a2ca80621ddbf glibc-gconv-extra-2.28-211.el8.x86_64.rpm 644e6172587c73c2f7c4ecb2b28cf13035b5c3fb209938d6cc8d1a451813a85b glibc-headers-2.28-211.el8.x86_64.rpm f5c8a809fae56c8cb5c5e8cadc8c1bbd41cc89c85d8e6725688443a61929a0d6 glibc-langpack-aa-2.28-211.el8.x86_64.rpm 8ab1745b0c2762a7b4d12345c35509c4ef8411276c6a78e1ed6225859d235eb4 glibc-langpack-af-2.28-211.el8.x86_64.rpm 41d63a4083a3a886ee284de05e4d50a1db09bc70ceca4de21686ead011de7aa6 glibc-langpack-agr-2.28-211.el8.x86_64.rpm f81ef5f6249cb748cfed19b63db6a952d4dfec7119ae7625558ded475a776359 glibc-langpack-ak-2.28-211.el8.x86_64.rpm 0850181093442cb5821feca12aae344067ad69318ba4f07cae5121bec22e17a0 glibc-langpack-am-2.28-211.el8.x86_64.rpm e49036676b20fe4e1370025144c1a1e7bb6fc58bffd8e1f23c6744191b04c59a glibc-langpack-an-2.28-211.el8.x86_64.rpm 1b29b1b7ffe007dbf548f973e2fba5ca9a03e7ebc8756f92e09eca95d49f857d glibc-langpack-anp-2.28-211.el8.x86_64.rpm 4f973788cfd6da0309cbdb44a0000b18f50bfe65161d8a352de9cce118715765 glibc-langpack-ar-2.28-211.el8.x86_64.rpm 1420e819195fb7f542f9302752d8c6142ec1a2aa99574fbfdfd016914d0fc9fe glibc-langpack-as-2.28-211.el8.x86_64.rpm 1ea8969e7dd29ba5960e68296fb816fae2480c5b7f6a4cff1815e17ff0d380cf glibc-langpack-ast-2.28-211.el8.x86_64.rpm c7b85acfc9349d1afbb0249847997197899cbd70e1b55ab790556030a694c7f7 glibc-langpack-ayc-2.28-211.el8.x86_64.rpm 143efe8e2217a8de2fed884baa95a5ddadc60406cb98ef17094f4e38b5860546 glibc-langpack-az-2.28-211.el8.x86_64.rpm b82545b11c2525da4ad815765ac0bbac3bf3c68c98d6f0d1069cd2464c5039a0 glibc-langpack-be-2.28-211.el8.x86_64.rpm bdd7e7ddb5c41a4b78c3882565b67a62b407c21dd18039c4bd58109f1facbb27 glibc-langpack-bem-2.28-211.el8.x86_64.rpm 97fd21bd5aa8fba4d7580b22c55f85dfb20acca7bf410ff280630da940215165 glibc-langpack-ber-2.28-211.el8.x86_64.rpm 4f359a758fba84b5bddf069f2a4c71124c8160c8ae7110f1d4525b4e934a4bb1 glibc-langpack-bg-2.28-211.el8.x86_64.rpm b76b3a54160736d2389cb62d2b8ab8cc06e7cd6ab90fa048e31d666e840294b5 glibc-langpack-bhb-2.28-211.el8.x86_64.rpm 931466a47fa50267652f19679102a4be4b1a4822d311dfadd31425a416fce07e glibc-langpack-bho-2.28-211.el8.x86_64.rpm 72338c9dc1abbb9d4d61f383e3754fbcc2a5b1a47425899fc15b72661cf4a0f4 glibc-langpack-bi-2.28-211.el8.x86_64.rpm 3e997dcdb6aae046c5ca5839f0316de421113312e067098a2b1ccf8cbfeef33a glibc-langpack-bn-2.28-211.el8.x86_64.rpm 670a2747b6aa8d29110deb029898ba5381b73302290efd1fa55685b984d031f2 glibc-langpack-bo-2.28-211.el8.x86_64.rpm 0485d5cc16a84df1fe80c34bef474377e78c5bbc1e6dfd0982133cd61f5ff89f glibc-langpack-br-2.28-211.el8.x86_64.rpm 32f5b8d849c07c49b889ddd71368d222cc2b581903d8b4db19e1f030a888bb52 glibc-langpack-brx-2.28-211.el8.x86_64.rpm 0308fa50f63d264a48d60b6d84313d0a67c38bc9ecf0360b48a93fe31e55db98 glibc-langpack-bs-2.28-211.el8.x86_64.rpm 0b931f490c7cb0575b0d21ec569c780322594e7c99f6fba5846a8b84977a608d glibc-langpack-byn-2.28-211.el8.x86_64.rpm da93fe0abeec6720f4c25a56ed9281908c56a0495a540a1df1b00538aa243370 glibc-langpack-ca-2.28-211.el8.x86_64.rpm f4566fb3524661d98ac360a7a4e52f180c5d4a0c9d0c7f613bcc21583d621bd8 glibc-langpack-ce-2.28-211.el8.x86_64.rpm 469ad495db0ff3e8b557f33f6ba5bf5a0f98cd4f0f5fa48afa9b6a2a0dde135d glibc-langpack-chr-2.28-211.el8.x86_64.rpm 4e5ff4cd1a6e99dd6abe56bbcfb157c7a89e9f312bb3804f12063b7b9dc0959e glibc-langpack-cmn-2.28-211.el8.x86_64.rpm a2801823d4bd2b4abe9c8b450e375aa9fe2426e52fde0d8e6fce53c88f2b8fdf glibc-langpack-crh-2.28-211.el8.x86_64.rpm d13e79283ec1201a6d0406a3f8483643f388f3948f2cfd4b7329119b7e1b7a97 glibc-langpack-cs-2.28-211.el8.x86_64.rpm b7822706b092858468762d88ecb84b83d91ee9e86d6da0090966bb5a06d680af glibc-langpack-csb-2.28-211.el8.x86_64.rpm 7768a796132318f5b4a1b869902870e01456e4ef2631b5687e300de656610c68 glibc-langpack-cv-2.28-211.el8.x86_64.rpm 7fba9954d28f5385cc38f6f0a1be3231cd55e6a553399ac1df1701791cd40707 glibc-langpack-cy-2.28-211.el8.x86_64.rpm 384bc757e55b803d8fc5fb784a87e6faa8435a00e6182c45184c4b38ba76e1ba glibc-langpack-da-2.28-211.el8.x86_64.rpm d89bde235199610fd23a9abbf2f59315de6c0f3a58fee9e9ec14bd80922afcb8 glibc-langpack-de-2.28-211.el8.x86_64.rpm 67ea4a7d17e3abc4b38a70edc9229c710c4c33443d82eeba7d87f8997ce215fe glibc-langpack-doi-2.28-211.el8.x86_64.rpm 2009df86b46b62139784c4633359811991cf5e29aab9325399d909b59d5516e8 glibc-langpack-dsb-2.28-211.el8.x86_64.rpm 1271f1a00bcd0363dda350d5c967f7c29a0483b144f154ea104b6bc3f0905e85 glibc-langpack-dv-2.28-211.el8.x86_64.rpm a4d165798cf42daf8a57663e757bb799f5cccc26c6b62621c5dba75eae446e2d glibc-langpack-dz-2.28-211.el8.x86_64.rpm 2c5dcb7ca78a91fe2f624277bcd203ddb0c24a0d01127e5037d72c0df7eda062 glibc-langpack-el-2.28-211.el8.x86_64.rpm 7d6fdb12f5c0d6d0a15184a9ba7ddac3ed9e5ff94e70b315267022a58ce00169 glibc-langpack-en-2.28-211.el8.x86_64.rpm 2ff8de02028dc59495a8fd5c5b5349ebc333cbd48878a79d73f9dcf4ccb56802 glibc-langpack-eo-2.28-211.el8.x86_64.rpm 2b35097ebf19ddb3559b2b93b896b5c93d43b64dcb479520be3d341a13d32e1b glibc-langpack-es-2.28-211.el8.x86_64.rpm bbfdc1be0c4c0dcb6c1562c2862af564b626f60c9f4a76ee5ec382a35bb7acbf glibc-langpack-et-2.28-211.el8.x86_64.rpm 7b7a337111227bb86292e419718b5f928a2ef330c91aa5f1770fe38e35d3687b glibc-langpack-eu-2.28-211.el8.x86_64.rpm 1808a8cea053b3ebfbd5ccbb8f6534ec0af13f875c27438be0aa097bfce9820b glibc-langpack-fa-2.28-211.el8.x86_64.rpm 4da60699f2db283a22d7bf6037763d6c936ad01a7593704bd0a70256ee0edd98 glibc-langpack-ff-2.28-211.el8.x86_64.rpm 798f8bcea6e3cbe87d86ea4459d8aa784718ff834810dc2ee6eda593b2190076 glibc-langpack-fi-2.28-211.el8.x86_64.rpm cf88a82019ea2ccfd18f1629f1537b690e6f5bf62e8e688f5f194e48df24828e glibc-langpack-fil-2.28-211.el8.x86_64.rpm b6e395886fea8d3e13c6a6a247bfd5f31f96edebf5a51da17ff0073e52ae1d78 glibc-langpack-fo-2.28-211.el8.x86_64.rpm df1f04db471a21757febd14ebb84902af1b84a292c06c1b346b2cff93bda87d4 glibc-langpack-fr-2.28-211.el8.x86_64.rpm 01b5519982ecf17ec6f3fdd7c226cf144dc349522f199ab9781b347bbf8fd3af glibc-langpack-fur-2.28-211.el8.x86_64.rpm 435a9be7bb57f55fe8e6a5750053f5bcd75f5df7b538c1406578b4cd9788a17e glibc-langpack-fy-2.28-211.el8.x86_64.rpm 6cd3adae8c308f2592bc0efff34c505090cedc3202e99bbe6ef5c5b5459b9555 glibc-langpack-ga-2.28-211.el8.x86_64.rpm 7442b1fa932383dbc1ca5e3795dc507b3c59c1fbefac4e10bb80535f6ea73167 glibc-langpack-gd-2.28-211.el8.x86_64.rpm cb09b26abbe240f6293a7f3ec9b3dcb88595991048cc5bfd1a8a6e8435b45ea4 glibc-langpack-gez-2.28-211.el8.x86_64.rpm 994273240ba0d9c4602f30990e86394d3776ff102efb23d2bd7c1fa094fd7f95 glibc-langpack-gl-2.28-211.el8.x86_64.rpm e9dab212d0e5fdefa73b29406167cfd715c2b85805949086f455ac7345cc586d glibc-langpack-gu-2.28-211.el8.x86_64.rpm c49ec2b0361bdf485a8d5367fbca83d1258ae8ab31c312bc0ccb1de298b248a4 glibc-langpack-gv-2.28-211.el8.x86_64.rpm 61336102ad654478038dbb637a29912cff8b7254aaa35aeb314a0c9db8447607 glibc-langpack-ha-2.28-211.el8.x86_64.rpm 326660083fc1b39786fd003cc3dd77bd406c9493aa2ed356188068b59e1d2acf glibc-langpack-hak-2.28-211.el8.x86_64.rpm 677d4e9e60d7728d1e84a459d914cd2ef89da40455e44a1fba4f408866a38095 glibc-langpack-he-2.28-211.el8.x86_64.rpm 387a9717422d05019bc0b5129ad07c145a9274042acd9263ccfb112bf9d00919 glibc-langpack-hi-2.28-211.el8.x86_64.rpm 76ffb9e3085e4a1ef4b663ccf6728da056c261c71974f5da765ee2c50a2d633b glibc-langpack-hif-2.28-211.el8.x86_64.rpm 4cfd1a5f5c168d2c9ba3f3cb51819e226d38d4214fe5306bb9bea0b215e92d40 glibc-langpack-hne-2.28-211.el8.x86_64.rpm 1f13cc96641c68129dec43a58fd3adc68d9d9dd7fa1ad2e733fcc29450f1af1f glibc-langpack-hr-2.28-211.el8.x86_64.rpm 8e09bf597d9bc0881d981597cad7ebe08ce7e2d789068947eb713040493e4290 glibc-langpack-hsb-2.28-211.el8.x86_64.rpm 7861f83b38eb49bbe9f62780d821a757cd2e568c483b546ff393bdafdb79c6d5 glibc-langpack-ht-2.28-211.el8.x86_64.rpm 88ba5b03f3e1d0aeaef8f515767e78561f004ac8a2031f984c3fae4695997d8f glibc-langpack-hu-2.28-211.el8.x86_64.rpm 2724e22897129d5ea299ee815833e9095440be5c316b7ab9c60c38753c21d509 glibc-langpack-hy-2.28-211.el8.x86_64.rpm 23179bca9dac9496d9e77d6355358d3ffbb3fead402a8ee719d71058b184e3ca glibc-langpack-ia-2.28-211.el8.x86_64.rpm 800b928dd4d8a3555a014849eb7dac68a648702e0d04805ef240358b0b0edb73 glibc-langpack-id-2.28-211.el8.x86_64.rpm 49b56dde6f267e7b7b665bf9cf66593ae2dca1a8d863a50ae215f5c20ce13ad1 glibc-langpack-ig-2.28-211.el8.x86_64.rpm 606be40dd87cc52b8ccd21d846dc00eab87ecca0e16bd3e3b5b4758949398e63 glibc-langpack-ik-2.28-211.el8.x86_64.rpm 396899da94cd03fc4bd8602fd043b3e6f6c79663125abbd853c2c90bc8235600 glibc-langpack-is-2.28-211.el8.x86_64.rpm a1df07a7034c4f8d821496b05c8deb75a766cb1a9dfc8256e3add6993ede11ac glibc-langpack-it-2.28-211.el8.x86_64.rpm 8d2ad64b6e5350546ed8dd36c857f59d229d84074e4101862a79c9093b194ca9 glibc-langpack-iu-2.28-211.el8.x86_64.rpm 9bb0a00f80e0494ed6e7445fe9ed56802171c1477e79e5acf32ba9d7c6a3cca4 glibc-langpack-ja-2.28-211.el8.x86_64.rpm 55e30ee8ba17f71606179566606509398c8b91fc56118b2de4cc12a5dc9c3f9f glibc-langpack-ka-2.28-211.el8.x86_64.rpm 13c202242a745399afda180072003d85dee394e265fe7530067b38a9d3f6ada6 glibc-langpack-kab-2.28-211.el8.x86_64.rpm 2760580710e016416f6d348116b71a6e8161c5c0aa7b96235232ef2964381688 glibc-langpack-kk-2.28-211.el8.x86_64.rpm 457bd3328502f9e5027b9707f8a812ca017ce1a17c2183504f6f9af1641ebafc glibc-langpack-kl-2.28-211.el8.x86_64.rpm 123cea29f35230b0c08e24995e96a7b2b56a6db84282c09d54d0dc63e16b01db glibc-langpack-km-2.28-211.el8.x86_64.rpm 139a960587ea478f958d6b5b98a04e4a278e06628fb0f15339ba645d754cf0f8 glibc-langpack-kn-2.28-211.el8.x86_64.rpm 3fc816cde5f0e228e06161e35072c4514195c71130000d16c991ab6c848d65ac glibc-langpack-ko-2.28-211.el8.x86_64.rpm 8485d4c74a242d25fcce0c3caacbc1246e47feb73af2845ca2181d47cff1639d glibc-langpack-kok-2.28-211.el8.x86_64.rpm 3d65bfc8a51546cca7a012b6a775caf8840e7c103ac8f14ba8dd441fe55af230 glibc-langpack-ks-2.28-211.el8.x86_64.rpm 4c9f5459ccf9514ff1f8cf01b4d1306234593bf08ae6eabb884a898fdcdecb0b glibc-langpack-ku-2.28-211.el8.x86_64.rpm 271a7f2ab0418a528ac59daf3006a9c54b2d4ba1f69c28a3c1bd8b88fc7a5981 glibc-langpack-kw-2.28-211.el8.x86_64.rpm 2e036a8ef9156d0e80905589bf32aacb13fbf431a8bc2f12acf0cbeb006ff5ae glibc-langpack-ky-2.28-211.el8.x86_64.rpm f921cd1c29ea1fba674af84c8da94d45226725c208460171619cd6c8676d0ae7 glibc-langpack-lb-2.28-211.el8.x86_64.rpm 013224c8ffc9f8e72b97dd70f1d899b191d2394e31d12e153094bff9b8e77c9c glibc-langpack-lg-2.28-211.el8.x86_64.rpm 6538df78b8b0287b364a6c90ea6ea8d2f2ead13ee28028990428b52c79feef48 glibc-langpack-li-2.28-211.el8.x86_64.rpm 680f0372bae3869ca4803d421a7d13fc77d95dba4f540db8f078622575248d97 glibc-langpack-lij-2.28-211.el8.x86_64.rpm c323cebfca86323dc25c7030f006b5210f208b6dff04e7f805fd0ea043f1169b glibc-langpack-ln-2.28-211.el8.x86_64.rpm 00b43444d9534ab752203f57450e8f1654b4f0807aae8d9a825d506848d11ff6 glibc-langpack-lo-2.28-211.el8.x86_64.rpm 758b385a6a2dda07a7635b25c5c7da907cfdceacc124e86e5aa126b6fb57ee20 glibc-langpack-lt-2.28-211.el8.x86_64.rpm cd85c448d4225fc9db8b679af51a641b5744ecea2ee75d40ba9ec6e9c03426db glibc-langpack-lv-2.28-211.el8.x86_64.rpm 0351a63dc04ae6aed1f2998a289eef917f6b82ff10c59de17bfa3c9ac1e6e34a glibc-langpack-lzh-2.28-211.el8.x86_64.rpm 189494caab9142abbe97852905b3878d7832d402c85cd9f3604bf40ebe2d762c glibc-langpack-mag-2.28-211.el8.x86_64.rpm ceb853972fdfe2b537a3bd6384d252a65349dbcb16e72461cbc9c0ffb91ac659 glibc-langpack-mai-2.28-211.el8.x86_64.rpm 0f7df04d99410b50d68d916c956b74649bcd215fb1f7a487c2262ca321d5efa9 glibc-langpack-mfe-2.28-211.el8.x86_64.rpm c01e18c8805d9ecc2996f2cf4391ff3f357eda6d85c44b282492d8e5119e764f glibc-langpack-mg-2.28-211.el8.x86_64.rpm 82dd8389732e1d4f501759f8c87f63ee2afc428f8865cfbd0d79f4aa58370a66 glibc-langpack-mhr-2.28-211.el8.x86_64.rpm 743daf561935fe23a89b706e44816ee49190289ffd26ede64e6a4e40ee2a2a32 glibc-langpack-mi-2.28-211.el8.x86_64.rpm 25f57807ae2e6cdda342b46cdd29542d639e020ea44e1259b4d9d54a0abf484c glibc-langpack-miq-2.28-211.el8.x86_64.rpm b96b112dd67c3c24b31e28bdae3eefcc8b62a80c11160eaadd1223de6b44a98a glibc-langpack-mjw-2.28-211.el8.x86_64.rpm 78b9aed5672b09b2ae6d346ec790a2b54054be0d35fba229da65ebaef5c1c2b2 glibc-langpack-mk-2.28-211.el8.x86_64.rpm 41d389876ac6c627fdafd4b7ce654170248e6615d20de6bd9433ba50b788ea8e glibc-langpack-ml-2.28-211.el8.x86_64.rpm a153adeb6aa15344e9196d8824c94d208095716df617b8ae889e97248e19d699 glibc-langpack-mn-2.28-211.el8.x86_64.rpm 5a821c9b241a91c9b7508513d4c90518620086965d79ed9cd4d3aba707bfdc1a glibc-langpack-mni-2.28-211.el8.x86_64.rpm 9b92cc461fa01b0e9d29073cfa3de3b54600aeb521846be05c0f4cfae3c97a4f glibc-langpack-mr-2.28-211.el8.x86_64.rpm 411c4ab9ccbfb76c8342b2c2ebc6de6eb1f897fa65a140332496483c641ddb4c glibc-langpack-ms-2.28-211.el8.x86_64.rpm 34374e7939288fdc197b1d363c77894b8547ae824a425619e6e0d9a065999235 glibc-langpack-mt-2.28-211.el8.x86_64.rpm 0980e1a2fa042a8e6b244d463570658d615bd6be87c2f6f9a8f2c5f780a14a21 glibc-langpack-my-2.28-211.el8.x86_64.rpm b52dad4c0746e0018af5e20160b7463ae487f7b8e9fdbe98cd9a209549a3ca5b glibc-langpack-nan-2.28-211.el8.x86_64.rpm a43fda466eedce6e326f2e6698916997690467b0198c3ce6de37e0fb1bf0686c glibc-langpack-nb-2.28-211.el8.x86_64.rpm be44930889608f24aa716423dcba128041305dd16a74d5f58d09420d8c26e57e glibc-langpack-nds-2.28-211.el8.x86_64.rpm 20e88af4d21b4345bfe88f6e7e854f69af92852f2113090b58e30e1e08f73dff glibc-langpack-ne-2.28-211.el8.x86_64.rpm 360015bca371087c8fe71133a837c7fd9a30254c3c0613ba2e4173ba0245b944 glibc-langpack-nhn-2.28-211.el8.x86_64.rpm cbc943ae41621a39f72604e4cc698ad20e19c80cfc2a37a5a68459f349dfbbd0 glibc-langpack-niu-2.28-211.el8.x86_64.rpm 912db2618c9b2ede004293087307ae8a515457dea0cd4ecd0f10525efd2505c9 glibc-langpack-nl-2.28-211.el8.x86_64.rpm e49ffeee574c41336ed4bc227fbb3281ee0c613584520cdfee99ffe0dbcd3c92 glibc-langpack-nn-2.28-211.el8.x86_64.rpm 38cc820d8d84794333b96b804606459c615fe77ad945b4e355b3cd4e00bd67db glibc-langpack-nr-2.28-211.el8.x86_64.rpm 2b9500454ea68fad039dd16251174c6d402adac8bb174f227870d2e8e23095cb glibc-langpack-nso-2.28-211.el8.x86_64.rpm 6f74f92eedb92bef6d7a6c814b103c14ae701c68674c21d8a9519e5b5cd3d984 glibc-langpack-oc-2.28-211.el8.x86_64.rpm 540d27004972bc328fc2e06e95d6a862048eedd3de6b9d3516a50fb104ead2e7 glibc-langpack-om-2.28-211.el8.x86_64.rpm e27ee5282111d2b88c916320c04d16b91a75246af83545b2964762f0881b6e22 glibc-langpack-or-2.28-211.el8.x86_64.rpm 8b739ae556e1385151ce80dd49fb46da31a6ac07475a3bb27ffcdf1df2833976 glibc-langpack-os-2.28-211.el8.x86_64.rpm 6c262e93f8e30c1e4708b69f30160b4371828d075d59a3579464660044a9543c glibc-langpack-pa-2.28-211.el8.x86_64.rpm 3703353a6ffad9cf46ebb169a1c279b241198b04b94c3ecebf20d03d77a4fb47 glibc-langpack-pap-2.28-211.el8.x86_64.rpm c5241ee5bec2f0939d89e97e1235da830872c5f65335d9331fbd5e70bf2dc36f glibc-langpack-pl-2.28-211.el8.x86_64.rpm 947b668d61656552e8e453b9a0d5d3fe6fff2c4bd55ceb088d4f1d3b1332c265 glibc-langpack-ps-2.28-211.el8.x86_64.rpm c28a24d68dfbd9e6b7ce832d9ada4a27a830c164af7753a546e244b2300a2571 glibc-langpack-pt-2.28-211.el8.x86_64.rpm fb76f05550ed367221e194aa080e694de437a41b051c0efd717afbcfb7cb77b6 glibc-langpack-quz-2.28-211.el8.x86_64.rpm f661e2effe803c7b961f3f9dde1d540f0d43324707eae76c76a79bb8cb142c22 glibc-langpack-raj-2.28-211.el8.x86_64.rpm 21a6087a63e4fafdbea986e918729a1e18f0470dc42bd93ec7f9c1c5eca010c3 glibc-langpack-ro-2.28-211.el8.x86_64.rpm d73e9cc46fd0b568c30579e7b2b5814f8ce59a868d9d29416d5a656646231965 glibc-langpack-ru-2.28-211.el8.x86_64.rpm 5cee3b18ed551ae56b514bea815e09e01e9ff46c2ec595f8b1adc7ffac4869fb glibc-langpack-rw-2.28-211.el8.x86_64.rpm 32b494030d7c97861c648a10e44573cdc63ee75c03b889e295930590650b633c glibc-langpack-sa-2.28-211.el8.x86_64.rpm 371f7ff96c32a6241704f85e4e29820140654ea2887f4b6fc083b4b9bdbb9a1e glibc-langpack-sah-2.28-211.el8.x86_64.rpm d6f10a6efc208262e99903af229306d47101a2503cf1addc3f7aab0871023980 glibc-langpack-sat-2.28-211.el8.x86_64.rpm d0f06bde0c9ef3388d006d953f567b146e22256eaa196e6accc4701545b8eb31 glibc-langpack-sc-2.28-211.el8.x86_64.rpm bc02360eabef233d3858b9cc8cd15978a7df5940eed638a1a5bee0200d6c01c3 glibc-langpack-sd-2.28-211.el8.x86_64.rpm 6a042b20ca73d21e4fc37ea33087d0849699de7e81f37ad6b9566332c113277a glibc-langpack-se-2.28-211.el8.x86_64.rpm 2c5f3a9075b9e4c8317d67218affae817ca0d07eb7863b26862d9632bb71cb17 glibc-langpack-sgs-2.28-211.el8.x86_64.rpm 338be78ffb73523c6ed2d29ec1e0c4403dabb80e4062be593ff46205c49f5be5 glibc-langpack-shn-2.28-211.el8.x86_64.rpm 06f416eefaf81a2a43d6264057482b3de8ae1667431ef5eaa73995a6b91417ca glibc-langpack-shs-2.28-211.el8.x86_64.rpm 65880c4d86486e3c4e4cd3a8c648b239bf08d5c766f7949460e5a7a6048eea3f glibc-langpack-si-2.28-211.el8.x86_64.rpm cab63a618533c0dc012966ac8386bf8b612269904e36023d8dfd75169fc553ed glibc-langpack-sid-2.28-211.el8.x86_64.rpm 368aa35c7a1afdb1af851544e6c7e527c713dd01331de1c2b003577cf712c8e4 glibc-langpack-sk-2.28-211.el8.x86_64.rpm b78ae9a9961f5cd593edce5b2f8ccf6602cde7d8f9a65685ce51b94320a04b03 glibc-langpack-sl-2.28-211.el8.x86_64.rpm 1a29dc1c26a304d5e5100e511b8a4cf6f362c6478acbd426afdc993759200a3d glibc-langpack-sm-2.28-211.el8.x86_64.rpm 5ad6aed336a39f4f9d430e12fb1194a888f33b19c7e2a0738ee390f7bcd1220a glibc-langpack-so-2.28-211.el8.x86_64.rpm e98f301170dfa5c214df1166f91b1e2aa0ef5928a26f9aed124b64bab507a1ef glibc-langpack-sq-2.28-211.el8.x86_64.rpm d1f141377c37bfb4691faf97a959ffdf37f9c64b63aa974b4fb0283d2905997c glibc-langpack-sr-2.28-211.el8.x86_64.rpm e77e3dbdb504daa7161a8e881fea43900bb93f84a5ab6c9663f40f6eade80033 glibc-langpack-ss-2.28-211.el8.x86_64.rpm 9db7489c5272ecda026233a1b42c34a47ab62e519373bbd3e548e05967796bd7 glibc-langpack-st-2.28-211.el8.x86_64.rpm 35eb7eea9399df9e8aa0c1a17ca5819eac57f237721cf921eeb35f7bf7b7e857 glibc-langpack-sv-2.28-211.el8.x86_64.rpm c8199e33c5ef77aff0a3510cc7940904c8a3aa0e875a10b863e3824408150988 glibc-langpack-sw-2.28-211.el8.x86_64.rpm d4b151cd2bbba3db7ab6462da2eaadb97be452ea81e60d2a356bce557e6047ed glibc-langpack-szl-2.28-211.el8.x86_64.rpm 744c2a96f0b490477c57457329d9d8891247bd01030747bb95708a18268ce109 glibc-langpack-ta-2.28-211.el8.x86_64.rpm 37b795be6ea1a9d317896c4efbdad7708106f971cd974d62f4d2247c471c2930 glibc-langpack-tcy-2.28-211.el8.x86_64.rpm eb7308a2063ddb7e71eea9ad81c5a6d220dc614a50d3087c309a359d0680349e glibc-langpack-te-2.28-211.el8.x86_64.rpm ea559641b6bd68551ee49729ffd9bbe2aa095f3efc394cdb848ec4c346cc5a11 glibc-langpack-tg-2.28-211.el8.x86_64.rpm 3b10265ba7c183a2ab02170398156695aff2da9d090b2f258ffc863f7777f00a glibc-langpack-th-2.28-211.el8.x86_64.rpm fe01360cb946f3a6045d6d47c700539508378c30f42e61272a61377fd08fc6b1 glibc-langpack-the-2.28-211.el8.x86_64.rpm 32f00d91c33f313550beff90b6758b70b062b4e3760b730391e52cd66bf1f03d glibc-langpack-ti-2.28-211.el8.x86_64.rpm 4e540192ae438bce2699e4faabb491f62b2e81a06272ab981cc8d11cdc2452d7 glibc-langpack-tig-2.28-211.el8.x86_64.rpm 03465a52509dda32f1f9eedf84890034877876f456172d388ae69aefcd5ef6fc glibc-langpack-tk-2.28-211.el8.x86_64.rpm d664ef530b1d8f97318bb4d51fab38e4b07e2884f60995a23f13b86e1d9fb730 glibc-langpack-tl-2.28-211.el8.x86_64.rpm d7ee87491daa6d1960b8a308ccdfd3458136fa0b54d020d909f338c52165250f glibc-langpack-tn-2.28-211.el8.x86_64.rpm ae11fba30a7055126f39f9500315a2a27959c764c4c94a7620f70ff115fa29b2 glibc-langpack-to-2.28-211.el8.x86_64.rpm 0e92344e660323537a4d9e9e7217cf586eb3f7d12c2ae4afaf5aec3589929457 glibc-langpack-tpi-2.28-211.el8.x86_64.rpm 8314de17011d2e9e8eaa83ac808c7e06b7a3863622448f2f3c452880ae4d3840 glibc-langpack-tr-2.28-211.el8.x86_64.rpm 63313c9815a9bcb48b4a8eb56219170eb6bb32fa67ad50f045325b8057b3cc51 glibc-langpack-ts-2.28-211.el8.x86_64.rpm 1cefcce0296b0faa9b1c7a4e30373f4b9f52cb6b239cf54ef60e5ba75f90350d glibc-langpack-tt-2.28-211.el8.x86_64.rpm 0a27f3693b203b6f6cc2effe219267336ed4826787608f2c5c494be2adf0f9d1 glibc-langpack-ug-2.28-211.el8.x86_64.rpm 0e9c7296bd63e0267b92278bffd1d48724eaeac6f752cb04804c0087f5680305 glibc-langpack-uk-2.28-211.el8.x86_64.rpm f85249d70dc081198c63924512439e94ba491a2fff719cf2dd2ebd440144e9df glibc-langpack-unm-2.28-211.el8.x86_64.rpm 1c0162c0f200c837c808bde800120961100d8b8d0803581469b37f8fb8c3493c glibc-langpack-ur-2.28-211.el8.x86_64.rpm fd8c9e0749d3439e218c1c82d334b0a3d59545e39df613a13ce98651edbd2b8f glibc-langpack-uz-2.28-211.el8.x86_64.rpm c60c2086c6964f788f40a3630fe9aaeba86456d0d02fa201eced2c6affd56ced glibc-langpack-ve-2.28-211.el8.x86_64.rpm 75ea8bffddfaf832d5b49594b62359fd33a4a6072752f44b4199abae74f5b237 glibc-langpack-vi-2.28-211.el8.x86_64.rpm 6b540ca86b0881c9fbc1d84e45b2643b729d18c9c670de82cde1162e5eb6f33f glibc-langpack-wa-2.28-211.el8.x86_64.rpm 356024e400ed63651ed21132676fa51d8e97cfa4596683184a53c93ca9831efa glibc-langpack-wae-2.28-211.el8.x86_64.rpm 481fd4d0b9429e7fdbf846f4e4bc699ef7bfd3fa1632ef12d2d58e36e3a3c5d7 glibc-langpack-wal-2.28-211.el8.x86_64.rpm efcf0312bd52f3db6ef951030722e1f6c14f562cabc4c6f244faa342ab8d4e63 glibc-langpack-wo-2.28-211.el8.x86_64.rpm 5fb80d43cc1c1786e22866527c4eca340fc08a4ac353546a5d494bcb3309ed46 glibc-langpack-xh-2.28-211.el8.x86_64.rpm 6f9f16d9ff7e58b5b734f0ed7730ee883547b33beeb2ec356dab365007bfb3ce glibc-langpack-yi-2.28-211.el8.x86_64.rpm 708ff469b57540b28347756634f3689d940398cdff0b679b3b0c8d3dc9cdeb02 glibc-langpack-yo-2.28-211.el8.x86_64.rpm bb592d6ae42597f720fcad5e1635044bba94383a3096d3ecf22c4f6333efd982 glibc-langpack-yue-2.28-211.el8.x86_64.rpm 001b8dddd4d34038a3a03e59c76eb2ede3df24f475cba1eacc2b7619dbde4408 glibc-langpack-yuw-2.28-211.el8.x86_64.rpm e1dfcf0d9913099f1a0294ec0233c5c8ad859222bb77c39a28016814ca9aa8e9 glibc-langpack-zh-2.28-211.el8.x86_64.rpm 4d74ee2e160e5fffceaa826dbba80426d9bb6530bc8bc8c99d64ec28e851c96d glibc-langpack-zu-2.28-211.el8.x86_64.rpm fa647ec8ab449cfdee8413ef938f07a19b2ca8ea8c89c791c142e35bda86823c glibc-locale-source-2.28-211.el8.x86_64.rpm c83175208f97e929d04ea595ea0df7e93cddc571c62546f4a8707df52d16b300 glibc-minimal-langpack-2.28-211.el8.x86_64.rpm 802ae4e74ce02c9fc87142959e11751c95edd15ea3a2289291cd645662674198 libnsl-2.28-211.el8.x86_64.rpm 7d38cb78423ef1a3c425de81a53d90ffe7874bf84ef4887a6459730f78c642d7 nscd-2.28-211.el8.x86_64.rpm 9c39a3a126fdd6de7b9c29683ba26f53606310fb1e9e7b91658f5838e27b139b nss_db-2.28-211.el8.x86_64.rpm 13ab2754dc35a893efcc5316ea052b751eb9391beb23bf08e81c3159230a17dc RLBA-2022:7686 iputils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iputils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iputils-20180629-10.el8.x86_64.rpm 3b12faafd3aaa7ad0bdb4a2b9e2a46ffe7c2f6fe17560e329ced2fdb023bf30c iputils-ninfod-20180629-10.el8.x86_64.rpm ab939a77cbe6a8842bf16c271119cc41038e6317d051fba258927d0bcf9ef4e8 RLBA-2022:7687 procps-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms procps-ng-3.3.15-9.el8.x86_64.rpm 68cd2593fc4e6587e6d217ad7f031edb276d56c9084ebd4607a0a59a05f90c98 procps-ng-i18n-3.3.15-9.el8.noarch.rpm df5d21d0a9941e6b283de24c4daefe6ec93e8ceab3e7acce43f3aa91546f6c0f RLBA-2022:7688 gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libasan-8.5.0-15.el8.x86_64.rpm 9af822bd0227e1b4d0aa2f9b266ff8698e4380586985e7cd6063d767e786b42c libatomic-8.5.0-15.el8.x86_64.rpm 6f97772b72d85c8700210e680224d94c2b625391de7d6344ee9c5fee66a55a51 libatomic-static-8.5.0-15.el8.x86_64.rpm 76eb6015f89d5be0f6c40202c9b18fab5a4811fbebdc09aad8e81963c5c7ffa2 libgcc-8.5.0-15.el8.x86_64.rpm 8c66cad2900e8c92f32b30a5f2472cf32e30ee88098bec39ad868c1c8cddc469 libgfortran-8.5.0-15.el8.x86_64.rpm d47ccb0468adb8ddf31f246eb890b076e24dfdace96bc4b06d046ecc605be3ee libgomp-8.5.0-15.el8.x86_64.rpm d45a6c6a41508044d351bec3cfb1dc14222ed64cef75d7e2f7051a45f33a885c libgomp-offload-nvptx-8.5.0-15.el8.x86_64.rpm ac734747de3a67074bb41287a03aba5721eefdd603f515e8edf6d007ecbe022c libitm-8.5.0-15.el8.x86_64.rpm ccc35b6712684197b4d21057419b5529fa6fd7dfebc7be7ab943fe59a0fb2682 liblsan-8.5.0-15.el8.x86_64.rpm 8d26a050c587169ce68b66e00985598116d8337120f2a9f1c5f1eac6575223a5 libquadmath-8.5.0-15.el8.x86_64.rpm 5287451bb6c6e7749b03b831efae7d5139d4487b74bff4e77a71778b36736572 libstdc++-8.5.0-15.el8.x86_64.rpm 4a62b7a7caba2dda46b77bbe00fbfa8cc9e52cc2332c59bcc84dad07666e536b libtsan-8.5.0-15.el8.x86_64.rpm 742a0839c8c705bdf1459cf4677a56a85c676e34052a85ca9aba620dd98d5043 libubsan-8.5.0-15.el8.x86_64.rpm aee698d8f7416f71c959e9b169f7e3f59f24c6e522321bdf690ddb05c25a06e1 RLBA-2022:7689 accel-config bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for accel-config. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms accel-config-3.4.6.3-1.el8.x86_64.rpm c4a1dce24e77efea0a75de123be3d0352887bdcd9fd883978a4790b9a63d1b4f accel-config-libs-3.4.6.3-1.el8.x86_64.rpm 05003da79eeb4f7f6dbe6a9e7ee8f9c8bd86a908c493b2eb05c51a5bc0c9d76c RLBA-2022:7691 selinux-policy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms selinux-policy-3.14.3-108.el8.noarch.rpm c8034fbd86e19f9162ab575001f2ad66d5dbc900e97fa9a95ae3e70aec8e7dde selinux-policy-devel-3.14.3-108.el8.noarch.rpm cd4a2d1bdf0dd76ab84f0b5d2e5fc51361e2aaa25817bf04f96d968324a47465 selinux-policy-doc-3.14.3-108.el8.noarch.rpm df6debc6a1a0e39d5907151d541899d4fbf35a6ae6689f94404767cd67daa65a selinux-policy-minimum-3.14.3-108.el8.noarch.rpm 09f25bf811f906c626041136acfb157ccad7234b66553a191616bfd087c32eb1 selinux-policy-mls-3.14.3-108.el8.noarch.rpm 5f9f7e496c7efeb6bd3507ded0921c4187f3a954d1afc8f649f46d293abafd5e selinux-policy-sandbox-3.14.3-108.el8.noarch.rpm d3b78e4cd13f6102348a39898910ca247f6963937e114f21d5041ee96e8bac55 selinux-policy-targeted-3.14.3-108.el8.noarch.rpm f7d7192718b7ac1997ef75f6d3b4fbc0e4e931ede22df6b538ca0719dcf7e5ab RLSA-2022:7692 Moderate: xmlrpc-c security update XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms xmlrpc-c-1.51.0-8.el8.x86_64.rpm a479c10be9c0632b5541f0bc879f2bf963461abcd93de0a5b026545c8d140ca3 xmlrpc-c-client-1.51.0-8.el8.x86_64.rpm 447577c58bdde8c8b2d7adddd6de73a68c3de2b47f051d3d30f010992348a762 RLBA-2022:7693 binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms binutils-2.30-117.el8.x86_64.rpm 34f7602fbd564a454544d50e57deb70341f0e0be42216083f56d837f42eba37e RLBA-2022:7695 virt-what bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-what. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms virt-what-1.25-1.el8.x86_64.rpm fabac9bd1b7d15e26a33078807e9a0f4a14cfe3551c6c1a7af0313c2b1fdec55 RLBA-2022:7694 tuna bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tuna-0.18-1.el8.noarch.rpm 58812fb015dcd75c62973e25433bd7333239d1239cabab22e2d022d60e268623 RLBA-2022:7696 krb5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms krb5-devel-1.18.2-21.el8.x86_64.rpm 5ce59851d62de2e31c383e2512b090abe15dbd7c3ba0454e3cfc2c0c3b8adac8 krb5-libs-1.18.2-21.el8.x86_64.rpm 796cbed78d747711d64dc2b8b60c0ca62728062c6258cba9e84e42acd3a6588a krb5-pkinit-1.18.2-21.el8.x86_64.rpm 29e160152243b5c08f0dd057aec98b9e7937cededbb918429b6918c516907a45 krb5-server-1.18.2-21.el8.x86_64.rpm aa0bede22958f981c67cc7b023d67bff3ca033d0908d1c72adac0f1701b622c8 krb5-server-ldap-1.18.2-21.el8.x86_64.rpm fd9c947f542df096119fc9839dd47bd561f747d56260682c4754a0fe513845cc krb5-workstation-1.18.2-21.el8.x86_64.rpm a39e550359f319aa3195adab4634d7d26c853847f9918849f654c7307dd1c3c7 libkadm5-1.18.2-21.el8.x86_64.rpm 46ff23ed4b7d93deb37e2815773e2c2e22b255afd05b79cb514deef905df44ec RLBA-2022:7697 python-dns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-dns-1.15.0-11.el8.noarch.rpm edf964bdcc51d9bed6d9652a1e3f86add29616c7d5ae6e5be2667f7bdb82145e RLBA-2022:7698 samba bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ctdb-4.16.4-2.el8.x86_64.rpm 0e38640b4ec7e2b978e56acd18714c095400ad751b0968c41a9a05b8f9b0e1d8 libsmbclient-4.16.4-2.el8.x86_64.rpm 0dd0bb391302d55239191bca072be53b02b3752837b1d77bbe176f8236e24427 libwbclient-4.16.4-2.el8.x86_64.rpm 605b793089abfbf4f92f98e527dd7463dfd40d2387d8c0f317f9707235a291ba python3-samba-4.16.4-2.el8.x86_64.rpm 303a580980adeb8ab55d440f8b56fd318e9a104c8d309a1331ae795f84cdb650 python3-samba-test-4.16.4-2.el8.x86_64.rpm b809fa56fa6fdde3658b15b0656a4a6e8cb410427024fc1003fb916b714ee8c2 samba-4.16.4-2.el8.x86_64.rpm 9cb7f8889b28c4f1ea4e24e38acbaa7759da4c16bb3f5cf8d724407cdb7423b6 samba-client-4.16.4-2.el8.x86_64.rpm 3c1667e71e3c3e196842e00d86bbb17ac92c97fa161f0d5da65579755a0834e5 samba-client-libs-4.16.4-2.el8.x86_64.rpm 79397bc1743c61409d33178e96ba8bf46c9df89b28b8ba84d90f8b5e28ace651 samba-common-4.16.4-2.el8.noarch.rpm 64ca28af1e9830cd10c7b6f5e971fbed4f5b32f49e10a5a6b35c49b39149566f samba-common-libs-4.16.4-2.el8.x86_64.rpm 2f2abfe87a737b2c8c5b82c3adc66ae80fd57230051e8a384e56ccf00293180d samba-common-tools-4.16.4-2.el8.x86_64.rpm b0b8ad30851aef77c97e91aea58105e653135c5ba454bca2beb9ddeff7c2c4e8 samba-krb5-printing-4.16.4-2.el8.x86_64.rpm d717b197d5142a075413705f5c32bdeff4d7141701206ecd004b4b5ff1d5ab1b samba-libs-4.16.4-2.el8.x86_64.rpm 95cea17d30c85a8eaf60c01f7ef7ae3ba71537e71e5bcfef0de9d13f5fb7ad23 samba-pidl-4.16.4-2.el8.noarch.rpm 4cc8b11a0da7253d955db6718ecb3a2e135c35ee7252f097fa2086390514eeee samba-test-4.16.4-2.el8.x86_64.rpm 82b0fafbfbc000ef9af39979d34eb8cebb3bb3a167d08d5b48e570be5cf5d6ad samba-test-libs-4.16.4-2.el8.x86_64.rpm 2050207a79247f730a87e4b8a216144c1ccaaccc08c3a00fef7b14db8eff782d samba-winbind-4.16.4-2.el8.x86_64.rpm 490135536def3c41862706c296f7367cd78c48ed204f4dc434b09f196a46b3a7 samba-winbind-clients-4.16.4-2.el8.x86_64.rpm 02038668ff44e44a719d737e6c626182b206fe163ff56ad208227f0d5e024e8d samba-winbind-krb5-locator-4.16.4-2.el8.x86_64.rpm 2dc4473eea1bf2dad7aed315b52bee836c73b60e6f7f01994081cb518fb322cb samba-winbind-modules-4.16.4-2.el8.x86_64.rpm b94884675f1961552976e7e81d1831dc9b9f805d982fb4e3bbe5e87280c36431 samba-winexe-4.16.4-2.el8.x86_64.rpm f3043b4ed152a6269f5011d7ebcfd9c41cac7bc5456203d582772a8aebe39769 RLSA-2022:7700 Moderate: gdisk security update The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format. Security Fix(es): * gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256) * gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdisk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format. Security Fix(es): * gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256) * gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gdisk-1.0.3-11.el8.x86_64.rpm 66ec9a7958e276d05cecf94279a216e66c8664f0b63aac5c53eeb0d34c246190 RLBA-2022:7701 at bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for at. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms at-3.1.20-12.el8.x86_64.rpm 7dad5b93c2f318e53bcba41d9b7dd073961c151779ba5bf41ccfbfd6db4b6f8d RLBA-2022:7702 mokutil bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mokutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mokutil-0.3.0-12.el8.x86_64.rpm 765e690a5c254620bb629ad9471fe881f91ea5d088986b18237af8e27a1bd466 RLBA-2022:7703 python-slip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-slip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-slip-0.6.4-13.el8.noarch.rpm 969e55a97a50fc39da7bfdd3ef25fe8f31c8485db610e2cbf15586f8e956517c python3-slip-dbus-0.6.4-13.el8.noarch.rpm 42102433519b624f384a59b9eb824ac7e37d917ee08dda1c3f4c454be89e06d6 RLBA-2022:7705 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kexec-tools-2.0.24-6.el8.x86_64.rpm 1fe05da1e61f5df5088315bfd79228ec13ef66cf05249ca78e4ea0ca055a86f6 RLBA-2022:7706 which bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for which. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms which-2.21-18.el8.x86_64.rpm 452c98861a00ebe8903c9ceea28d3cc425e5f35fd5dcc54e21ca7cff331f598d RLBA-2022:7708 expat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms expat-2.2.5-10.el8.x86_64.rpm cc3b62a23e3dfa72fabd4f06a3d67f261877ae569a68b4119f8fb6980f08c5a4 expat-devel-2.2.5-10.el8.x86_64.rpm 6d946c3ee2ccfd83c09412e7829bcaf478584f34528cc86ecaa7991be9cb5310 RLBA-2022:7707 nftables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms nftables-0.9.3-26.el8.x86_64.rpm 4eeea5699f800844a942a92a51c16dd7b11caa238c9a3bb0a5d8f10650e9b723 python3-nftables-0.9.3-26.el8.x86_64.rpm 842ffb02c17eb98e7d0ed5e2222e999f77bf720a42b81a01dddf602f74778964 RLBA-2022:7710 rng-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms rng-tools-6.15-1.el8.x86_64.rpm 2998dd57d15c67862f9f2958611c266982654b665acabd253db464aded8285e8 RLBA-2022:7711 libdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libdnf-0.63.0-11.1.el8.x86_64.rpm 5fcc8c4c2a56aaf9023659fd1cecfa7d3ff8b5bac1ba13a55b05ede73ed19ef9 python3-hawkey-0.63.0-11.1.el8.x86_64.rpm 1f8a0ee73be22b830ba2074cedffda92bb189c3d5675c943113824fd0c20ac81 python3-libdnf-0.63.0-11.1.el8.x86_64.rpm 355f01e59ade60cd732a49596bff65584278536cc5184bfb6b91abce805decfd RLBA-2022:7712 dnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dnf-4.7.0-11.el8.noarch.rpm 948fff4b3cea109242e6d308e3256bbdcd26f214a044898075f7b8f77a0b80a8 dnf-automatic-4.7.0-11.el8.noarch.rpm 2ff731967901546be305af1b8d7452e53e3bb8660c6d00cbf939060977415603 dnf-data-4.7.0-11.el8.noarch.rpm 48782a17c1a4f7c89035d7eea46f681fce219210e17e727a0f816c0913fe32c2 python3-dnf-4.7.0-11.el8.noarch.rpm 075e1145f2523acd593dc9133ad5d094efa3bf7d76816756b2966a77ee4203a6 yum-4.7.0-11.el8.noarch.rpm 58f20b0790242c6216c79ee52c72e4edbe869b66aa14e2d8364c41b22aa2b50f RLBA-2022:7713 libsolv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libsolv-0.7.20-3.el8.x86_64.rpm fe43d02c561ff2698dbbaaff45de2e833dd87627ae7ff396d6982510aac43f0b python3-solv-0.7.20-3.el8.x86_64.rpm 1463a99a36051f38291d6a6fc03e23f9d09481026eeeddc30562a2ce67972a01 RLBA-2022:7714 device-mapper-multipath bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms device-mapper-multipath-0.8.4-28.el8.x86_64.rpm 1a3cbcf38fbf179e4de359a446012fae850eca48a2a952514a7cc8bdee2a01e7 device-mapper-multipath-libs-0.8.4-28.el8.x86_64.rpm c516814bc813cff77ffc44c7eb73b7356935ce1bc9017915ed8f5913dbccc567 kpartx-0.8.4-28.el8.x86_64.rpm 9ee0a475618169cb5287ac50497e4fe5fc64659e086f8e87954d8e345aee149e libdmmp-0.8.4-28.el8.x86_64.rpm 7e853093f40fdbb5d32d6c7275662aecb720696ca436749b778f843cd1a6ceb1 RLSA-2022:7715 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libxml2-2.9.7-15.el8.x86_64.rpm ec91cfbefc82671eedca3fe6c54930f37dd83bd55bc4a2780c8a12b1cc74879a python3-libxml2-2.9.7-15.el8.x86_64.rpm ceb24cfc2a7d6652d36311e77ffe4865c1e957d605feff42ea6c3a9a6a4270d3 RLBA-2022:7716 cups bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cups-libs-2.2.6-50.el8.x86_64.rpm 265a56f7893b17918e27ccb7023bb44b2bd104173146e55992e0bb3188b4e312 RLBA-2022:7717 elfutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms elfutils-0.187-4.el8.x86_64.rpm 7473bda0fa5ae598fa49f84afa0c974a3360ae6a837ae9c25ba4fcf694e4b14b elfutils-debuginfod-0.187-4.el8.x86_64.rpm b40e7276d51c80562f8f7a096446efaa0084fd2e533ea5308c7ed916fe834f12 elfutils-debuginfod-client-0.187-4.el8.x86_64.rpm ebf366d9e220aa1a877a1697905844ec8db5a79d88f35e3eccd558b83eb5e8f9 elfutils-debuginfod-client-devel-0.187-4.el8.x86_64.rpm 80de62b9e71da2a6ac9dc910231cbf763ecb3e803c61810f57ff26a302a93b39 elfutils-default-yama-scope-0.187-4.el8.noarch.rpm b01511cf066f23b46d7e0dbf923e653635f3265b7619d30414a5f1ca25ad6e73 elfutils-devel-0.187-4.el8.x86_64.rpm 9601a685e489a7b4e270dc9bc28bcc8ee0270bdebf564d09cae2fa4a1a7f9ad5 elfutils-libelf-0.187-4.el8.x86_64.rpm 7f55b5cf8ef85d3d21bbe1fab9753b3b6f2c7ac407f26c9de4fb40fa2e00a587 elfutils-libelf-devel-0.187-4.el8.x86_64.rpm b5080e0da7d1904c3228bb56b5d471380726106b9423d5d781912c61b6485573 elfutils-libs-0.187-4.el8.x86_64.rpm bc1f8ef873477bbfd6b1c86ca70251958ef936df068abbe107caea92555e4904 RLBA-2022:7718 cockpit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cockpit-276.1-1.el8.x86_64.rpm d226e5f0e7b7bab482f8edc8d28be33cdba4a2380c3f612c187743018ffacfda cockpit-bridge-276.1-1.el8.x86_64.rpm 6739e52d18742bc329be5b7d5f7ec23e5b65976520e08bf95273229145ec9386 cockpit-doc-276.1-1.el8.noarch.rpm 891dcb760e2e7df7ff43831e2874fb96dcb15aaa16d03baafe7a2f18d06c9787 cockpit-system-276.1-1.el8.noarch.rpm e1ecbc2e62b5aca745ed0929da469ae80504d3baecee1fb61a5150cad1ce4537 cockpit-ws-276.1-1.el8.x86_64.rpm 26b8e53b96d11a89ebd8c1a5ff17256d9dd79b84fec8cb78b7af8a28fe262341 RLEA-2022:7719 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dnf-plugin-subscription-manager-1.28.32-1.el8.x86_64.rpm 2a4bf35ad6bc63aa96167270eb92be3c5c2f36f53ed8082f8bfbef091bfa1214 python3-cloud-what-1.28.32-1.el8.x86_64.rpm a2e98a225767c1a148bf43e3652d4d3071a1388456bb1e3b1fddeb731eb3c88c python3-subscription-manager-rhsm-1.28.32-1.el8.x86_64.rpm 543b45655ca92135d0dfc78815fc1927f4a603ecab8f903f2f72ef056412288b python3-syspurpose-1.28.32-1.el8.x86_64.rpm b27ebc6837ff0879903ff0532c80cdfb0e2a9b1f6bfb63791b7bf31ccb348b0d rhsm-icons-1.28.32-1.el8.noarch.rpm f644f44033ecb86e842fd031abc77e9749f3fe82ec978af9b936003fa63b8d3a subscription-manager-1.28.32-1.el8.x86_64.rpm 639b2b58d29124cf8b71d9ca8efd18cd2bd08ef0832426d7866522d3d6ebce5a subscription-manager-cockpit-1.28.32-1.el8.noarch.rpm 0d02c1271b223de8b704ff7dd8015a0f69d2be13709a4c3033ac7a6ec1b8ba63 subscription-manager-plugin-ostree-1.28.32-1.el8.x86_64.rpm 947094fc36f4fe7412fd35a259f3fe4cecabcf3a17242cfab4821bfce363d242 subscription-manager-rhsm-certificates-1.28.32-1.el8.x86_64.rpm 9e173673bd5d1f608f090d49ff7ac5de1256ce0d1a599228fc20e2576e5bcd79 RLBA-2022:7721 cronie bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cronie. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cronie-1.5.2-8.el8.x86_64.rpm b9776e48474af4047000b71d4ef61ffe8f749696836d3a027aa74411811349a6 cronie-anacron-1.5.2-8.el8.x86_64.rpm d559fcb4fd80e9693ffae611888d0645a38cff787fab6ff0e2a5c01fae2186cc cronie-noanacron-1.5.2-8.el8.x86_64.rpm 5b63f1de1b158eb8d4e95741e5678ca711acf23cf4c8cf85257a768c47ffbd02 RLSA-2022:7720 Moderate: e2fsprogs security and bug fix update The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for e2fsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms e2fsprogs-1.45.6-5.el8.x86_64.rpm 6878cc0c37fce2415f4c330afc1eec5c5e72af50c5b4842183c82ee36c72ae78 e2fsprogs-devel-1.45.6-5.el8.x86_64.rpm 802c56a40eddb2ff95f4db334989bf8341752e7561222dc214ffdcd9a354b710 e2fsprogs-libs-1.45.6-5.el8.x86_64.rpm f2764b8398e95071999bb2593ab1a01524d1ce88df2a7930c99bf70e7ec6b34c libcom_err-1.45.6-5.el8.x86_64.rpm 7c8a761d037c4aca0f7279f61b7b10762121221442506a6f561834cc60e2bc19 libcom_err-devel-1.45.6-5.el8.x86_64.rpm 1341faa07bc64c3ea21b4e93e204a50e4b5d88daa5a9b169cc5e80bf244f9eec libss-1.45.6-5.el8.x86_64.rpm bcf9353cbae4b107cde09f7a432e373d3af7c6ad9e2e527e1c8795317f237010 RLBA-2022:7722 libcap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libcap-2.48-4.el8.x86_64.rpm 6ae8aa1457bf79b15f68536beceacd24e982067065db2042da7e3a02c7ceb8f5 libcap-devel-2.48-4.el8.x86_64.rpm 0dc5f61bff8797b2ab38229f566b52a0094c56b105205119c21894f8a24509f9 RLBA-2022:7723 pam bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms pam-1.3.1-22.el8.x86_64.rpm 8f7b51a0ba4cbecf64e8afc85adb217d82138e8a4d8beef8429a14b867522e29 pam-devel-1.3.1-22.el8.x86_64.rpm 80cd78fdf9ad5c6c1bf5a51cf9e2fadffdcac91be56fa407708f7b633fd564a7 RLBA-2022:7724 zlib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms zlib-1.2.11-20.el8.x86_64.rpm f13232d2485bfdc3eb03d62f53bdfd05e003886ff68f5bd609da49b32b7a44e2 zlib-devel-1.2.11-20.el8.x86_64.rpm 5aa63ca09326893c34ece592fc1b097c58ac1a95dc5b18524c6946ea5ae05451 RLBA-2022:7725 dracut bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dracut-049-209.git20220815.el8.x86_64.rpm c26ccaa038491a1eead7b5c00f18661d2aa1a6210af252ea0f76b8a1b6cc39d6 dracut-caps-049-209.git20220815.el8.x86_64.rpm c45c066989a4cf572f2226e21d19a6567690a71b6ed565dd4f89d256b2704ea7 dracut-config-generic-049-209.git20220815.el8.x86_64.rpm c9acf987033e75b4b06a8c47221cd8de519b2f0d4f7f73e83b9e5c9165c921bc dracut-config-rescue-049-209.git20220815.el8.x86_64.rpm 189ac13df7997885485f2d85d45b7639170fd89f4ed042319d9dd9959edda31f dracut-live-049-209.git20220815.el8.x86_64.rpm 4d8a8fe3d0bdfe356038d05b6022dc29172ec9f9a67e3f5313cd6918352e245c dracut-network-049-209.git20220815.el8.x86_64.rpm 494b6cd946340982f52e962dac1178497a9dde4861ad5cff12e6d83771b07688 dracut-squash-049-209.git20220815.el8.x86_64.rpm a9626b589ca1d4e31913372897db6698ed079b485fbc38bf0f194bc0af1e8b4b dracut-tools-049-209.git20220815.el8.x86_64.rpm 3f1772ef424fdddf170defa2b0a55667f43f3ae813034ea255b18d2f20ff8d3a RLBA-2022:7727 systemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms systemd-239-68.el8.x86_64.rpm d50bbfa4cfdb3812d4019b97acb0ea08b6dbd73e3495181b66f98006b71e9e9f systemd-container-239-68.el8.x86_64.rpm 5e3dd27c3a1df2ec935675360f6f6ad1778ee47afe8507fb92335413be879b9e systemd-devel-239-68.el8.x86_64.rpm 12dbbe12fefc8f3801c5506db6c2ea8b2d86476c47a3852625a9d816a61d084d systemd-journal-remote-239-68.el8.x86_64.rpm 0b66a69cb7ee42d01a686707198f276f44cacaee503f13cefa4a942058da59d7 systemd-libs-239-68.el8.x86_64.rpm b7a18c5106b5a4e7c64433480e16dc1e43ad1d03aa729684c79064a1f75cad24 systemd-pam-239-68.el8.x86_64.rpm bb7f24cfefcb244b76e9ce9e3b3d9246239928034cedb4ff562e4d29c3787e4f systemd-tests-239-68.el8.x86_64.rpm cb3f58923f5bb2f8049b798301a9764f16a78c822563be1b4f460f1f9fd68d40 systemd-udev-239-68.el8.x86_64.rpm acd46f31d4e9ae58f61dd68fd4fee3ebefb166dea1123f1e1bb192de1afcfd6d RLBA-2022:7728 libtevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtevent-0.12.0-0.el8.x86_64.rpm 7c9572eb5dbb8320b1f0285f696f09f36e95054a1e2837a49a0f89f9ab4558d9 libtevent-devel-0.12.0-0.el8.x86_64.rpm b4542af7df99638c6f352b42984c32721ca2207fc8871a96baf8afd726f7facd python3-tevent-0.12.0-0.el8.x86_64.rpm f5576e09f7206cfe12db8b0115dc7fbe229292bb7707069b23c393a5083dd0e4 RLBA-2022:7729 libtdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtdb-1.4.6-1.el8.x86_64.rpm 896d8869d37997f2f2c9ec749646a6ffffe6ac2e3214abe8b87538a6d0bad112 libtdb-devel-1.4.6-1.el8.x86_64.rpm debe9ec4ee8919fd49decd99cfc2830432b32f2afc1dd6b1d03328e49c99b71b python3-tdb-1.4.6-1.el8.x86_64.rpm 634ffd38f06ad95f6a0c4d39f7a9f05cc1d232706a4cbff7db342d53705677b8 tdb-tools-1.4.6-1.el8.x86_64.rpm 010c470b6aece7ba5078bd25d678767a3e14537df8b0195a3ca7b9805dd7a359 RLBA-2022:7731 ding-libs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ding-libs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libbasicobjects-0.1.1-40.el8.x86_64.rpm bb8c59145267245b9fbe4015f903ffb0e6e7cf67d813a13109aaaa4af95b15a1 libcollection-0.7.0-40.el8.x86_64.rpm 3084594020e071c6c0fb640ecb5ec23048987cbc9a46b49d91da9cd086dcbe59 libdhash-0.5.0-40.el8.x86_64.rpm bf2b194833eeb149187efab628e9a99e532ff94a9dac11888aae43c3673458ee libini_config-1.3.1-40.el8.x86_64.rpm 1cb5a54f97b62ee8759de04722540d60d3a21e9938e63f3e0f729821cd4109f6 libpath_utils-0.2.1-40.el8.x86_64.rpm 8835e841ec98445af29550ee9b3a5c4b3f844dd71859f29448b8a124f007b762 libref_array-0.1.5-40.el8.x86_64.rpm c8ca02aaf38b445e377ead5fbf1f4ca93da2b82ab19ef449c1d59f583f5a2561 RLSA-2022:7730 Moderate: libldb security, bug fix, and enhancement update The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484) Security Fix(es): * samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484) Security Fix(es): * samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ldb-tools-2.5.2-2.el8.x86_64.rpm 8491b20ca4c0a1fc70e90a73ad037eda2675e81db9ede946317e5b6d0ed9ac88 libldb-2.5.2-2.el8.x86_64.rpm ce2b5b6302968060f62d5804d5e4d27e1a230b1fccb78fccf5ef6b33f7e382f1 libldb-devel-2.5.2-2.el8.x86_64.rpm ebfc75d131cee929f9b532d4a62967d0b09ef039b98aa5d2a8325f98162a13ad python3-ldb-2.5.2-2.el8.x86_64.rpm b93a9b330665a5586c7188845c74f445672d8ba8df1afb5eff80b76551eb0c92 RLBA-2022:7732 sos bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms sos-4.3-5.el8.noarch.rpm ee738963148db3a0e089207c8d3eae0476334897414147f59928f771b427fd4b sos-audit-4.3-5.el8.noarch.rpm 11f63711cbf952f7e5f0eaf592db922d8f08a7b93d42604859ac6e2f66c4a4d3 RLBA-2022:7733 alsa-sof-firmware bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms alsa-sof-firmware-2.1.1-1.el8.noarch.rpm a43ba6cd50f9ec68ea27a934bc4a193f2e61d5c25a00ccece3ef94e798e8eb6e alsa-sof-firmware-debug-2.1.1-1.el8.noarch.rpm da2f7a90e1d042e3919263f83b90c47b969662446a365394e5503dc127b194f2 RLBA-2022:7734 rpcbind bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpcbind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms rpcbind-1.2.5-10.el8.x86_64.rpm b36da1043f7f45fd4baaae87a80f66215803bd0f2a9a69c5d03ec9c0df60a4ab RLBA-2022:7735 bluez bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bluez-5.63-1.el8.x86_64.rpm 5f7b23929721e93dd87d4f0b2aecebdea31e6508ef16f12d7e69341eeb66d83d bluez-hid2hci-5.63-1.el8.x86_64.rpm 49bb95c3e4ae87a078866bbf714c358dfa75c32974bb3a63194793344c0dc304 bluez-libs-5.63-1.el8.x86_64.rpm cf0c60f452cdd6f0e32b44d9bc89d2c8b8c320c64c677272f711713cda6c4db2 bluez-obexd-5.63-1.el8.x86_64.rpm 905ea2875c3e655ceaa0ada6e02c25d4bde91a67b2176ec1d5cb3d334ddd59d2 RLBA-2022:7737 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms opencryptoki-3.18.0-3.el8.x86_64.rpm f3019ca847472876279dabe05f54f0999888f9ba38671a8ba35080c540e47180 opencryptoki-icsftok-3.18.0-3.el8.x86_64.rpm 04b792172b5105a591733f20edef5ad08672f3d6a09ad3ad614626eca9f5a420 opencryptoki-libs-3.18.0-3.el8.x86_64.rpm 193c3c2fdc2d5f64b2f182e546adcc71f80de8a7a0c144f0678f207988b3a719 opencryptoki-swtok-3.18.0-3.el8.x86_64.rpm 039d4cbd979c052b4ce5be040014175429fb058c8a38008e15d405a29ec1f58d opencryptoki-tpmtok-3.18.0-3.el8.x86_64.rpm 361cc1915f6611d33e691d832d0faef83154e0e51ea35a8e2a3b5afa121218dd RLBA-2022:7738 authselect bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms authselect-1.2.5-1.el8.x86_64.rpm f5885226e8757114cf656b82ad04160e04aef0a9aab87c0e719ef53144cb2a2b authselect-libs-1.2.5-1.el8.x86_64.rpm 8776c1a2e62ba1f864e7227d6a2cc3d390fb4dcd50bd1649ca95fb79c46b5a28 RLBA-2022:7741 mdadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mdadm-4.2-5.el8.x86_64.rpm ff7f517a8c40e9526dae90f51ad353706ce9c5ad28b6554ae452a1ba4033c844 RLBA-2022:7740 libtirpc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtirpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtirpc-1.1.4-8.el8.x86_64.rpm d8d8f58573146fe53cf97fe46859ea02bd2d9f150a67e174a97d82311ad371b5 libtirpc-devel-1.1.4-8.el8.x86_64.rpm 3808f6fafd018a080b30c5b862a133824dbff26881902ab1a80307d8a7a5cbd5 RLBA-2022:7742 linux-firmware bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iwl1000-firmware-39.31.5.1-110.el8.1.noarch.rpm b392e895d3afbd5ed826372f3604d908bab2709f69c6d60d13750e8dc81e3dfe iwl100-firmware-39.31.5.1-110.el8.1.noarch.rpm 337a8fea74f082be29c60bee17d47093ef647a922bd506619bbeee0eb55a4da6 iwl105-firmware-18.168.6.1-110.el8.1.noarch.rpm 288ed43283f51c59b7e50a0dc593df6628870840f58321eae575a5b5380fdb5a iwl135-firmware-18.168.6.1-110.el8.1.noarch.rpm 9450cd2506434c5aec720a8e08bc33338266d96585599046ee05f63459de5ca2 iwl2000-firmware-18.168.6.1-110.el8.1.noarch.rpm 29f026eb5e715fcb37bbab8ea3c9d27cae17e540ac1c5b573f6aa32625c791f1 iwl2030-firmware-18.168.6.1-110.el8.1.noarch.rpm 62e23f22cda37774d7119e98c9b10705e1ecf6e0e32ba7c0967e9fa328dce004 iwl3160-firmware-25.30.13.0-110.el8.1.noarch.rpm de4b78e335e5932ba208394cc12aeffc7feed7acb2f18f394f3fb5cc568aba8b iwl3945-firmware-15.32.2.9-110.el8.1.noarch.rpm 2d4181863240f991d144bfdb7647f47cd1fda63b8a3e785bc7ec4111a261dd4d iwl4965-firmware-228.61.2.24-110.el8.1.noarch.rpm f130043513b361d6ec69c1ad373406524f4d4d80edd8b055f5f0549c4753e609 iwl5000-firmware-8.83.5.1_1-110.el8.1.noarch.rpm ceb43de383fa1e590c05ef040b769940f779212ecc27b3c719bd7c1305b43e2d iwl5150-firmware-8.24.2.2-110.el8.1.noarch.rpm ec9a2076dc4160925ab3972b816ad7a1b6f10297f66f8ad23aaaa5a340550724 iwl6000-firmware-9.221.4.1-110.el8.1.noarch.rpm 721c1b80f635aec0e4e243c20f4dd464bf5b1705b369e0a27cee734931d2c743 iwl6000g2a-firmware-18.168.6.1-110.el8.1.noarch.rpm 726669bdca669cf5abe6933d294f1248737844f315371c32716e13501842dd07 iwl6000g2b-firmware-18.168.6.1-110.el8.1.noarch.rpm b9cdf0312038d745cd0591bbe410fffec4d0ced7d58b844090da267e7da15348 iwl6050-firmware-41.28.5.1-110.el8.1.noarch.rpm 1174de416e10dfac15f61ea201d8f54c2da2d71725d8bedcc0cd8daca3a41bb0 iwl7260-firmware-25.30.13.0-110.el8.1.noarch.rpm 2986a3d51b14030af76e3fbe72208d266a3c6ae6afee4af5b4a94eb448b3b043 libertas-sd8686-firmware-20220726-110.git150864a4.el8.noarch.rpm 23ad7de4d4084fecd2719465ac68dd0fc87a09e6a02dd989e63dc8246a127752 libertas-sd8787-firmware-20220726-110.git150864a4.el8.noarch.rpm 8044c8712188cc19e15f04d2d8ffa9829cd3df1f267c8da9ffb4004ab0132b0c libertas-usb8388-firmware-20220726-110.git150864a4.el8.noarch.rpm 3de6570a0cbd700a823a5f1a9a2b495e8a26e451517ddb97f5bdbdeb57f0a6c2 libertas-usb8388-olpc-firmware-20220726-110.git150864a4.el8.noarch.rpm 32493d237acfe25379667ad067edc6306413783fee195ead85258ff95beec859 linux-firmware-20220726-110.git150864a4.el8.noarch.rpm a7e4b2efa8026d94832457e29367e854b7aa7e98c4a6adaf1402dd0be61ae2c5 RLBA-2022:7743 autofs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms autofs-5.1.4-83.el8.x86_64.rpm f464f194cba239cec02c8af19f2b8c1e61efd86fc5a00915366cc305c40f3767 RLBA-2022:7744 tboot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tboot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tboot-1.10.5-1.el8.x86_64.rpm fa9d5d70ba14a39aff185d879f2a76c3253de6bb141803093f972cdcb3fc9b64 RLSA-2022:7745 Moderate: freetype security update FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for freetype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms freetype-2.9.1-9.el8.x86_64.rpm 1f82bd400e0ebd592f64347968c0ae85970230f51bbc8a2e49cf10a08f88526f freetype-devel-2.9.1-9.el8.x86_64.rpm f299047e3abcbd68a1c1503343adad11e59bd4e7d0e0bb0edee3e2b78f0f5ab8 RLBA-2022:7746 zsh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms zsh-5.5.1-10.el8.x86_64.rpm 84cf7d7e905e02bcbd6ecebdf426c8d93f065ea402e181a4457bb62d02279374 RLBA-2022:7747 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tuned-2.19.0-1.el8.noarch.rpm 8e8428e5485fd6f6db1417c72f7dce9ad3115424e79e6df675b4b3f5f9846679 tuned-profiles-atomic-2.19.0-1.el8.noarch.rpm a88e4f30555962ab6e526a8e9e1910c7fdb07d208f162f40163134c03adb7cc5 tuned-profiles-compat-2.19.0-1.el8.noarch.rpm 2fa950728ee6e10b81ce23f9a11702388d0f78137e31644908e94a84f422b4dd tuned-profiles-cpu-partitioning-2.19.0-1.el8.noarch.rpm 38d1470f454154f2fa1258fd042ab28abf7120b3bf2cbd6c9f147395b6add489 tuned-profiles-mssql-2.19.0-1.el8.noarch.rpm 9165bb6a4d2368005ec46773703e928dff9c64669370e8cad67214a626a6caf8 tuned-profiles-oracle-2.19.0-1.el8.noarch.rpm 1d51c3da8674233ff884f936846f25d795f3d2345a81459853634a5752b2d9e0 RLBA-2022:7753 ledmon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ledmon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ledmon-0.96-2.el8.x86_64.rpm 440d04929f122cdceb5a78df0f295423a85350ba8c41e3b8cf339aa2e14feaf7 RLBA-2022:7752 iproute bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iproute-5.18.0-1.el8.x86_64.rpm 16d15715ea84fca1abb50b1fd8b9aa31947f394a8e5ae6a0c0e609fa832ddf05 iproute-tc-5.18.0-1.el8.x86_64.rpm 52e2c0a8aac52bbc2d47c767509a749b900e4114a73b67485824c79a61349c7d RLBA-2022:7754 environment-modules bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for environment-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms environment-modules-4.5.2-2.el8.x86_64.rpm e29e1480f2d38fdbac6d3862e4ee3e4ccd4370965ea4a43c8eb3067659a98149 RLBA-2022:7755 microcode_ctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microcode_ctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms microcode_ctl-20220809-1.el8.x86_64.rpm c85e7a453ac15e05f9f3c4b5ae8508f8c7f8e940259d160d3874c431f9a5335f RLEA-2022:7756 python-rtslib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rtslib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-rtslib-2.1.75-4.el8.noarch.rpm d60cd075dbaf1d38752921078ed51980f4f8e1514fcd858de9f30d2dccffe397 target-restore-2.1.75-4.el8.noarch.rpm fd3ee14675eb7b215e5ec44ed958fbe2647eaf9615fc348ece11375ebaa99b85 RLBA-2022:7757 sg3_utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sg3_utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms sg3_utils-1.44-6.el8.x86_64.rpm d1fe4e43ef3940d25003839ab92c509c3f2870af90e3581e3c3987d7ff3651d3 sg3_utils-libs-1.44-6.el8.x86_64.rpm d5323bca03b3995dc94df82603cea33abc86f88074b7d6af8c9b052327711c98 RLBA-2022:7758 coreutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms coreutils-8.30-13.el8.x86_64.rpm 85c43e908f5262db2ea4f1ee1076cb0afd54b68386626ab0f2f57292859b07ad coreutils-common-8.30-13.el8.x86_64.rpm c1b73d361d50078615825ab34bd793e1c69729b7be8151ddd88923a7be42ba75 coreutils-single-8.30-13.el8.x86_64.rpm 10b075817dbc618fcdaf76c4d10b73af4b9bc780442680bd53fc707a7bf63862 RLBA-2022:7759 dnf-plugins-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm f289b75df81b2d9ad9933b59b05c546239d3def15d0ee3182b9e9bdfda0ca34f python3-dnf-plugin-post-transaction-actions-4.0.21-14.1.el8.noarch.rpm 32c2dfc400c7c6e21792d9409b37aca81ab3577e611873017df164f505d1c8e9 python3-dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm 3ea9ee75f9402e4d86a5b21828a0a49e933508de2b60ae2803eb7bfbd7d31b21 python3-dnf-plugin-versionlock-4.0.21-14.1.el8.noarch.rpm e3b7dd311d9d0cc78f7aa964edf8e0a8cbe482dd58c82279b55486daf009d973 yum-utils-4.0.21-14.1.el8.noarch.rpm 8250e9f58056269892bcad80f19fa592c670e47a047082892e452f9b5ea91169 RLBA-2022:7760 ndctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms daxctl-71.1-4.el8.x86_64.rpm 2db009dea46521fec1f0577eda6d5bdc455ba5f0c0b046ef96ea91148e38dd42 daxctl-libs-71.1-4.el8.x86_64.rpm 5329ad794133c3dec1d26aa770f71753f92f9bdd2887366537158cfa4f30add5 ndctl-71.1-4.el8.x86_64.rpm e908cb04d30da21e4fa19e57b7a71c34fcb774227592513ea0f59a73b87506a8 ndctl-libs-71.1-4.el8.x86_64.rpm fef989ff9e52a591cf223a073bbfdc478784be0537f442a1702cbeea7297cb5c RLBA-2022:7761 fuse bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms fuse-2.9.7-16.el8.x86_64.rpm 1dd36ef3a8ac86ff704d22a239ded8375bec1bc91dc5b85bef89b5c795830ef7 fuse3-3.3.0-16.el8.x86_64.rpm 65463d967fd88bbb6be60071c6ca269acc1b4c9cebbfc0d27fa4cdd9672f09ec fuse3-devel-3.3.0-16.el8.x86_64.rpm 21437e23958cdc9fdbef7cd71e45b76e9403a8139ea391cdb37328cdcbdf7819 fuse3-libs-3.3.0-16.el8.x86_64.rpm 9246992726f5febcb356dc31578003625fc5f950870c0945a97c010b63654b26 fuse-common-3.3.0-16.el8.x86_64.rpm 14178b8cadbc6444e9d2c91b73e54dbccce3e09091580e090ff0e93cb660f097 fuse-devel-2.9.7-16.el8.x86_64.rpm af93907c9020c31aa6ef34c9909b174abb833a74549ee136295d0d2b2a0f99f4 fuse-libs-2.9.7-16.el8.x86_64.rpm e75da9286b4da0a4a98e3703d3f9fc0e7d6bf743d00fba521fc0c0fe8f2cde28 RLBA-2022:7762 hwdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 RLBA-2022:7763 openssh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms openssh-8.0p1-16.el8.x86_64.rpm d7e4c2fb9945d5b508fd1ee38af8d49cde049aa8715272e8ccf9354073ade17d openssh-cavs-8.0p1-16.el8.x86_64.rpm 0523fa2cf4171bfb8428ce395a8f7b86153afae590795c512ef341bebd387b9a openssh-clients-8.0p1-16.el8.x86_64.rpm 8911d46d560ae4f55a48415d21b5940f0149a0182a1d69a35281048a6ca7c982 openssh-keycat-8.0p1-16.el8.x86_64.rpm 8e9a3a157cd39709e59f7a9fe6665fca89a020a6880615d7ce2c2543de5b9ab4 openssh-ldap-8.0p1-16.el8.x86_64.rpm e67e85c3d0a6258e8c686d0719c15e8ffbdd3cea0b64e2818d20596219f3a3e1 openssh-server-8.0p1-16.el8.x86_64.rpm e64ec8be2351169746bc1fbcc7071bef420d7f46c85f4c43fd6de43ca63ef76a pam_ssh_agent_auth-0.10.3-7.16.el8.x86_64.rpm 3b72e9cee581fcf2872cf76c018182f6ba8494bc2ee7e9daa8ebd617dfb234e8 RLBA-2022:7764 kpatch bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kpatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kpatch-0.9.4-3.el8.noarch.rpm f015d9416b817158f4ebec7c421dfa4c3966e1226934aa621291ae5e6ba14f3b kpatch-dnf-0.4-3.el8.noarch.rpm 37135ce718031624a4e063a1279bcd8961fe8672f9aa31d735400e1e96f747bf RLBA-2022:7765 ethtool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ethtool-5.13-2.el8.x86_64.rpm dfd42cba11f7a7a68d45bf7e992dc9d8df69acb699d7738a9bf8d0e37c48d0aa RLBA-2022:7767 libbpf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbpf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libbpf-0.5.0-1.el8.x86_64.rpm 6804db28d9db3b20c42e00dd248b7853c599850755b02898a60ba7d5e0fb40a1 RLBA-2022:7768 nfs-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libnfsidmap-2.3.3-57.el8.x86_64.rpm e89a1e7f45e931d6c5f9e50ff8bd15b5e211bf118ca1582cfde176ab3f45a609 nfs-utils-2.3.3-57.el8.x86_64.rpm 1cd56d017048cd5cf25dadddcbe2df1d553628f5eeaeb3322c1a4d18e8ec3210 RLBA-2022:7769 dbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dbus-1.12.8-23.el8.x86_64.rpm ab9ee1bc5bd4c2840f088dc61e995eca2c1eec444cf5df7c10fa5ac722e62068 dbus-common-1.12.8-23.el8.noarch.rpm 58d1cd7b3c07140cc19a76f6d548bbdd99ff5917de84efd15693bca0561e8cb5 dbus-daemon-1.12.8-23.el8.x86_64.rpm 4c1b129a8eaeb98a754b5317f4cb9ca17c82f655a1024b9230c87564c13e4683 dbus-libs-1.12.8-23.el8.x86_64.rpm abeeaa5229c12c1612929559f003ce6d1417517ec2c864a82a3ddaa11d89a207 dbus-tools-1.12.8-23.el8.x86_64.rpm 36feaaf227c012cfbfc2ce439d05a222a4a34b082c24c7d8698fbc9453d24fc8 RLBA-2022:7770 tar bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tar-1.30-6.el8.x86_64.rpm efab98a8bb9651748a93b495425c0d17dc6c1da850b0d30872d4729a0ec34bf1 RLBA-2022:7771 device-mapper-persistent-data bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-persistent-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms device-mapper-persistent-data-0.9.0-7.el8.x86_64.rpm 044f1aaba91ba9d2c90f8531789d2fbd60799f01526c1a5217dcb3640830b785 RLBA-2022:7772 smc-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms smc-tools-1.8.1-1.gitbbf7e8c.el8.x86_64.rpm 7241ee64d7d1b6889a6ae5166ef3c0e5214ec78bbf99e28fe7b9e88068e01c34 RLBA-2022:7773 setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms setup-2.12.2-7.el8.noarch.rpm e470141a5e3db486e3c26d6d071677489888b09e703093d3f59e22e30b92e155 RLBA-2022:7774 sanlock bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms sanlock-lib-3.8.4-4.el8.x86_64.rpm e1724861f92a7541935abd89c970f8061e71dadb0039012c2b09d012315792b8 RLBA-2022:7775 libnl3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnl3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libnl3-3.7.0-1.el8.x86_64.rpm d00c37fd814a045c8c326c5b0536bab368ec26968df7e9e78be20d69036ce822 libnl3-cli-3.7.0-1.el8.x86_64.rpm 34182d7931963bb255228c6848dc424f1e625c9ed14856845e2f89941d41b95a libnl3-devel-3.7.0-1.el8.x86_64.rpm 5ae6118352b477eb58fd56b912285d2570e1b229e7452c15ffa0c576c26e23dd libnl3-doc-3.7.0-1.el8.x86_64.rpm 3bef795f0918019528d4afd733a5c35a52d7fb853eb17b1a5d5ffe44c8786be2 python3-libnl3-3.7.0-1.el8.x86_64.rpm 19371d7a59cd21f139d69c82d8629d86435c804933a150475b1cc7c2c43db0c0 RLBA-2022:7776 libverto bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libverto. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libverto-0.3.2-2.el8.x86_64.rpm 710a6b9deeb18e8e2972bc6738cd1ac9403c60bc5c2a83c6229be69075aa0a4e libverto-devel-0.3.2-2.el8.x86_64.rpm 85586f38601b774aecc92dd4120d3ea30a3ebd76a6230d9d837b9a5568f8f683 libverto-libevent-0.3.2-2.el8.x86_64.rpm 13f0a8a52f183415653de09d4d477ca5f9d6c56607907a2a700e68755a503030 RLBA-2022:7778 kmod-kvdo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo, vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kmod-kvdo-6.2.7.17-87.el8.x86_64.rpm 2ee09279c8ea781c9de5b302b306faf283f5c9f4624764300f97950b8ca444d2 vdo-6.2.7.17-14.el8.x86_64.rpm 2e0cb47cf000e908c58b4c2d00ee7bb85423d221a01aadc1d0a71ddfc0cbd229 vdo-support-6.2.7.17-14.el8.x86_64.rpm 104483d8f3a77961955600b48e11ac27982f3f8c7bcad2e73cb42239892afa0d RLBA-2022:7779 curl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms curl-7.61.1-25.el8.x86_64.rpm 325023f3237487450b5c5e99b372de6c03bf1bdb7edeef0c5285f6623c0c042d libcurl-7.61.1-25.el8.x86_64.rpm 89d300df2a78b12e95873a29e498cc09915845c7ff81c9014517596b33adbd0a libcurl-devel-7.61.1-25.el8.x86_64.rpm e08ee177b14f2354e560f60c6e4b6fe937083561734f440ee25acfcb62c3a7fd libcurl-minimal-7.61.1-25.el8.x86_64.rpm e6df6651340a2b6bddcf150b1128c42aea45ba0cde44878e3b7b8644381a2047 RLBA-2022:7780 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms librepo-1.14.2-3.el8.x86_64.rpm 156746e163f17cd7d79818e9cc14e2ed0c9065dc150d7815bdb2f705d54ce7ff python3-librepo-1.14.2-3.el8.x86_64.rpm 924fd2e18a17401a53349b42708d0e54f261eb125e9bceba86733ce569da0353 RLBA-2022:7781 gdbm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdbm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gdbm-1.18-2.el8.x86_64.rpm 0101595236571d8dd468551c0f95777ec232bcc84c2fe197b4f251d85c90346a gdbm-devel-1.18-2.el8.x86_64.rpm d75c1167d87edfc167b8072d2afea4317338b725b7bc04ebab7808b25cbefd0a gdbm-libs-1.18-2.el8.x86_64.rpm dd0f839da095f72e05136e59de39e42be7034358f352b8fef632678c5d7416be RLEA-2022:7782 strace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms strace-5.18-2.el8.x86_64.rpm 1e631e0f63c4e6fd898d0ab6c416f10002ee49bce280ccaa79cd74ec7e9b15be RLBA-2022:7783 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libblkid-2.32.1-38.el8.x86_64.rpm b66111077572921fcad790fda05e0861e04cc7588d45ef2ee1769056c55f49a1 libblkid-devel-2.32.1-38.el8.x86_64.rpm f2139bd977427d66938bfa43f46f9d8c2ebd00ef55df3c0d92910c40c0ec760b libfdisk-2.32.1-38.el8.x86_64.rpm b7dc8609548bb5b36a5baa6d7cb7d853bd83440e9f0b08dd53f24d735f42043b libfdisk-devel-2.32.1-38.el8.x86_64.rpm 0ff823161e4e0697cb03e6a4f1139cc2ca1b377b0cdccdc3e636da37d358262f libmount-2.32.1-38.el8.x86_64.rpm 05edca78074a0ac2ab06c76a2bff252594783d2d91049e0702077a1b83a8dfa6 libsmartcols-2.32.1-38.el8.x86_64.rpm a3b1b7735ab0ded07cc2764478e9a0c473c1dba79dc6899676ea4fd054b8999f libsmartcols-devel-2.32.1-38.el8.x86_64.rpm 259c78dc4de17753bdba24d694746a3fef12e50ca48ab7e95b6cbc13502a5464 libuuid-2.32.1-38.el8.x86_64.rpm 031688455169a37c3dba3e95b3aaf3bfce49582f7606ea234b5aea9ad50fe4d9 libuuid-devel-2.32.1-38.el8.x86_64.rpm c8d68ff48762cfcf73bb888e13f54a9fedf4151c85ff426ae09d494d4425a1ad util-linux-2.32.1-38.el8.x86_64.rpm 96e990f0a0dc107325b5584ba06ea201db8fba2b7bf9f23ffe2ad0b6a41d9b43 util-linux-user-2.32.1-38.el8.x86_64.rpm 1628cba8e3975a9bd17b9a50ccff51ae1d922aa4b350e22d150bc537a4a9bf0d uuidd-2.32.1-38.el8.x86_64.rpm 995450a2fee330947120b0ef2a23d4d2a5627d1e58c403c3288914c3dddeae85 RLBA-2022:7785 nvme-cli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvme-cli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms nvme-cli-1.16-5.el8.x86_64.rpm 641f73e6bb125148b6f5912ddb15a0b9959c8819e67333fa51d401a0e39fa41d RLBA-2022:7786 libselinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libselinux-2.9-6.el8.x86_64.rpm 423470c18dd1ad6a879cde958e49eef317fa355518fc6429c89e575470a2a032 libselinux-devel-2.9-6.el8.x86_64.rpm 608c9f979b4902a2b459c04cce7116ee66bc47ba4d2fd350b3bfb421b2569a67 libselinux-utils-2.9-6.el8.x86_64.rpm 0302c3f0ef5abbec721ed4190df66398201bdec081b7174d8a3fbb08af2a38de python3-libselinux-2.9-6.el8.x86_64.rpm 2d901998c4c6d5e349e3ec24ce937a8afa70ea7a19a1c4e8021965d2c7f69b03 RLBA-2022:7787 irqbalance bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for irqbalance. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms irqbalance-1.9.0-3.el8.x86_64.rpm 48e013d3431e850695e3c2119a5b2990938b05433024c680adf145893b8a6af1 RLBA-2022:7788 libarchive bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libarchive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bsdtar-3.3.3-4.el8.x86_64.rpm 60dc3f9c516d80b1833501d71cf7699076f677678edcdcaab7af11170f93553c libarchive-3.3.3-4.el8.x86_64.rpm 0253d5d22ad86d07bbcc9d7f58eecfa107aaf82b51f55fa479443504d8d67c14 RLBA-2022:7789 dhcp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dhcp-client-4.3.6-48.el8.x86_64.rpm fe55adbc8c0cfc4a2f34f6154677191356a4c1b7782ccbf0d7ce7d4403e189c1 dhcp-common-4.3.6-48.el8.noarch.rpm e13712a0dfd2a88079f47a1507913848a61e238fc82e60d20c863c7a1594124f dhcp-libs-4.3.6-48.el8.x86_64.rpm f3e8f4377a036846400a0e154b909a5e386572f8cded19aa1224605c76589da0 dhcp-relay-4.3.6-48.el8.x86_64.rpm 0da139aab0f7af5130c0740522718c4f481cd8dbffa44113c58cbc4c8192a0e0 dhcp-server-4.3.6-48.el8.x86_64.rpm ba6ef796723829517985e83629c2b7fdceaaf3f499d377de48a2851d2a3c4bae RLBA-2022:7792 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms device-mapper-1.02.181-6.el8.x86_64.rpm cdb9e1ea18556615608aabd0438080ba1e8fa1570d648995a5e0b8e59f67de58 device-mapper-event-1.02.181-6.el8.x86_64.rpm 68cca29505970555116252762305b5f9b731b07f3ffb6d227a6496a68fed6a7b device-mapper-event-libs-1.02.181-6.el8.x86_64.rpm 05bb1f60bc250e7ea7e136c6a3dc8303480f192c45c9503921a0431d7cd6a692 device-mapper-libs-1.02.181-6.el8.x86_64.rpm 4a00d9b4ef66d7fdc814014c171b55f0acd4cb9c1f6382d209404dd27155fbb6 lvm2-2.03.14-6.el8.x86_64.rpm 95acc19f606a237a4938deb6ddbb7cf1aaccf05038d9877dcb684fd4c6ef881d lvm2-dbusd-2.03.14-6.el8.noarch.rpm 2c066ef7fb9501e667b432d9a0d6dd02d4f161695de7bbd3e66530a654621db5 lvm2-libs-2.03.14-6.el8.x86_64.rpm 038e02edeb320c8d7eb32e8e3bbc430cfa9e108366e857ea752af8aebfdb52fc lvm2-lockd-2.03.14-6.el8.x86_64.rpm 1e9e147a17515d42774f73f03029df0dff4be7c69d8b73315dc057141fd9b7b0 RLSA-2022:7793 Moderate: rsync security and enhancement update The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms rsync-3.1.3-19.el8.x86_64.rpm 485d93c8b35fa83c50acc71fb4b8f6313f4241b1c940a94d3b2ed7d55ac52c82 rsync-daemon-3.1.3-19.el8.noarch.rpm 3c1e198412a68878c3ce5e1c516ba4b700a0eda6ee00e63eaace2e467b5b0edb RLBA-2022:7794 shadow-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms shadow-utils-4.6-17.el8.x86_64.rpm 8e9343148d8c00c2b88bf3a5140ff5a6864cbfdc5d84a043aa0bcaa5057f9912 shadow-utils-subid-4.6-17.el8.x86_64.rpm 7d89b766c6e153e62d95d73836d908f0a3350cf6332f679f6da006fd06915d1a RLBA-2022:7795 gssproxy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gssproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms gssproxy-0.8.0-21.el8.x86_64.rpm c26e6967b01c674a95f25d9f4a17ee45e2a44787bfff580ee7e7d3dd80cfe767 RLBA-2022:7796 iptables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iptables-1.8.4-23.el8.x86_64.rpm 90be5c35287cb2a091ee668de356b878e0fc05296b8bafc946bfebb2beca90c0 iptables-arptables-1.8.4-23.el8.x86_64.rpm 8dbac2dfa89da6102a3a089ff10a68d4481378a0540a3a7f8988959e046338ad iptables-devel-1.8.4-23.el8.x86_64.rpm 6b2476d8e16da9a51627ef25038853f2cfdf4b71d0f1c4de1988d562020a5a62 iptables-ebtables-1.8.4-23.el8.x86_64.rpm ae9928b04d3114a4dd309a0a3f83297f9fe48cce260cd659ab1c6723366be635 iptables-libs-1.8.4-23.el8.x86_64.rpm 8183dbd14af2f4d4c0565a7a35fbd7aee8f0ec7fbc8ea9f771f1e35b59d48f44 iptables-services-1.8.4-23.el8.x86_64.rpm bed714e31076aec37fe5051bbe40ba22865eb14d60bbbc860e438caf697ef3aa iptables-utils-1.8.4-23.el8.x86_64.rpm c7e79600566d67c1be9482bad8279a802d1ff9c7f7db3be4b5024a0d99ccb301 RLEA-2022:7797 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ibacm-41.0-1.el8.x86_64.rpm ea98632e58d4a819264c1f65caec0579fbfed0a4e8422e7d59d0471dee4ebbf4 infiniband-diags-41.0-1.el8.x86_64.rpm c0ca319daac1ba7258b15b8c1100755d024628b263c2be05128c9d3fcd60a64e iwpmd-41.0-1.el8.x86_64.rpm 251d14b43d463fea2c2b0762e34010511fdcbd422f7af59aaa845ecbff8560a7 libfabric-1.15.1-1.el8.x86_64.rpm 642ca45a7f9d2bcd71ba9259ffaeafec7dd295cab28b525f6025f8d127935092 libibumad-41.0-1.el8.x86_64.rpm 9f7ecc14fc7c5dfb5f209f47f044e39eac739c18b7ad1e58d471eef0972710c4 libibverbs-41.0-1.el8.x86_64.rpm 3475dfb56a09b2fa163582d734333c4b159f0aa20b0e035caea2d1be575b9d9e libibverbs-utils-41.0-1.el8.x86_64.rpm 1218c5ba6414f18fbc91465604a6d4cb9d3b1fdbe1dac8b2a8718d52730fad85 librdmacm-41.0-1.el8.x86_64.rpm 97d3734c519bdda0317beb19432d97d69cdd939471ac3432331414d6db5e929a librdmacm-utils-41.0-1.el8.x86_64.rpm ed69cb24de0d5433bbb0288a5e37e31363323e5e7d367883ea4d12ab3f79b233 python3-pyverbs-41.0-1.el8.x86_64.rpm f28e000b6f672c560cbd4186a2231d7e67b3de5e4f034ae8435d3a2491b1f5dd rdma-core-41.0-1.el8.x86_64.rpm aebdd77340d5319f8a53cfc00bdccf61170ead519381a1abe1515071093c9052 rdma-core-devel-41.0-1.el8.x86_64.rpm cf756155e85ced149f6e83cfa3f6842b0af926f65221a935aa335fcc69f85134 srp_daemon-41.0-1.el8.x86_64.rpm 431b1a1d10739bd561d639afffdebf680bf0fa59b0328df2f14543ceb1741dd5 RLBA-2022:7798 initscripts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initscripts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms initscripts-10.00.18-1.el8.x86_64.rpm 6c0475cb1f7e0d3c7b6658f969e0a01d5935798888bc31da2b42e36acbcf4f2f netconsole-service-10.00.18-1.el8.noarch.rpm 01a0b14c2c9286a8dddb8b86d432c0319feccbfbfd26c9e5a11aac1513d7aa6d network-scripts-10.00.18-1.el8.x86_64.rpm 533302779b9f3be8acf89b05f4894406bc5452e87b50e424000467be92345f2f readonly-root-10.00.18-1.el8.noarch.rpm cdc79cf85b3769685f257187953ec57a5aa8bbd06dde1e28b832acbb5a5a2f22 RLBA-2022:7799 grubby bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms grubby-8.40-47.el8.x86_64.rpm d9bcc2da7a8dd7f29bb15b413ad4ff9e3ab0ddf5b1c11fee90f1e188f10d4167 RLBA-2022:7800 tpm2-abrmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tpm2-abrmd-2.3.3-3.el8.x86_64.rpm 52bf5ce4765fe3967f39695aae1e0b8d05501685d6248c494818cade9ea05f06 RLBA-2022:7801 memstrack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memstrack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms memstrack-0.2.4-2.el8.x86_64.rpm 56e9e38fe7b34215f6b68f6729a14011a248ec43ed116413b8d1d70750294681 RLBA-2022:7802 liblockfile bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liblockfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms liblockfile-1.14-2.el8.x86_64.rpm 61157f747e39923f3a6ca2d1cbaa42b5c9ae3b6cb9786f76c997fd823f446fdd RLBA-2022:7803 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtalloc-2.3.3-2.el8.x86_64.rpm 98ed813ca966e3024fa0fef669b88f583196bb4b135d59b6411587bf2fb1866b libtalloc-devel-2.3.3-2.el8.x86_64.rpm b94c9d0027f462c4e9a7c1c004e1606e0254694a30311b2ad2ad4537e9b9c9dd python3-talloc-2.3.3-2.el8.x86_64.rpm 43ce0cae3c6db844d067bef17335961f2af11ae05e31290652c5ecd31f2fa5c2 RLBA-2022:7804 libsemanage bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libsemanage-2.9-9.el8.x86_64.rpm d08e18048af1c5ad125356edc17d805cdac32f33a1db756339d292ae3bc93428 python3-libsemanage-2.9-9.el8.x86_64.rpm 7f7c7f0b08535b082dd4a877324453f56f4f5d977982751e1c0843b41be90af3 RLBA-2022:7805 policycoreutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms policycoreutils-2.9-20.el8.x86_64.rpm e10c35ecc2d40a18165cc5e2352497e100982e16b141de1d4dc5b253f64846f6 policycoreutils-dbus-2.9-20.el8.noarch.rpm 7469bfbae4fe7597b05e5bf0af996be891c0603a2d20b2efa793b47bd850ca98 policycoreutils-devel-2.9-20.el8.x86_64.rpm bbfe3f9ebeb2ff96a5aa29e98f8aeafcac8b25e6bb43a76612a9dd2a22de48d9 policycoreutils-newrole-2.9-20.el8.x86_64.rpm b1a262d251cd9e8c7a54ea605d3e3afa9161928dd224e7443c352a66845b2e17 policycoreutils-python-utils-2.9-20.el8.noarch.rpm 4f48c6d787965dec6db81f43a20279aa0aa246002c02afa4ec719155890a0423 policycoreutils-restorecond-2.9-20.el8.x86_64.rpm 709a0e0e0abad38cfc8ce4960a2b9b56e32b0df312a170ea0d8c5d85dd20db62 python3-policycoreutils-2.9-20.el8.noarch.rpm 601dd458e26f2a412f2c7d0a9feffbc5f0bdbb2835186ba5880a6640d731868b RLBA-2022:7806 syslinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for syslinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms syslinux-6.04-6.el8.x86_64.rpm 004e1c6ccab4c1691baa99e0ef4a2fe70adf6a499766b6851525a57c614079df syslinux-extlinux-6.04-6.el8.x86_64.rpm 58ef4e36ab3ff0b45f879498e3661bb4bd897dc9780d87604d7f1a4497a70ecc syslinux-extlinux-nonlinux-6.04-6.el8.noarch.rpm 65380c1d03fbd9affa8c311635d895d8663e0d059f71c171363dcaa6a70a62af syslinux-nonlinux-6.04-6.el8.noarch.rpm aaaa5a716fc708737112a9e1946d0d09c6202ad407c93f56f769f97d13ed16c8 syslinux-tftpboot-6.04-6.el8.noarch.rpm 25ec61fb83f952c8d40fc9309126a9f37ad7acfe4f49ea4cce93757dd1288cc6 RLBA-2022:7807 lldpad bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lldpad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms lldpad-1.0.1-19.git036e314.el8.x86_64.rpm d57c3a25898358a3ad96d7c02fb9ef78dc669b3d4697a0fbfe3fee0cc6f46658 RLBA-2022:7808 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms file-5.33-21.el8.x86_64.rpm b58d8ff9bd863b2eb2858c25755aecfec73f048b8257a832a33a43d3a584bf8d file-libs-5.33-21.el8.x86_64.rpm 45678eb6e41623d2dee99e536fe20f23994460aa53fa05bb9d277dc721abe24d python3-magic-5.33-21.el8.noarch.rpm f2d3628e48e4c8a3e869939665ad34a0174deddd88e2544f1a203f19e0132d6a RLBA-2022:7809 libpwquality bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpwquality. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libpwquality-1.4.4-5.el8.x86_64.rpm 11d928808fb7b434912fdb9320671f86f64364a9f6b4883a45bbfde9b9802f1b python3-pwquality-1.4.4-5.el8.x86_64.rpm 76c71c2d7e731b33d879d6fdb701892c81b71d74e8cd20077a8157c11e6072ad RLBA-2022:7819 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) rocky-linux-8-x86-64-baseos-rpms python3-rpm-4.14.3-24.el8_7.x86_64.rpm e1c16b79fce78de0cd225edb18baf4912ae103a4d1e4427ba48545f1e1442b7b rpm-4.14.3-24.el8_7.x86_64.rpm 52ddb09b53c7fe658f11a5353fc090dace91285ec842e39a64d6e08627b2b278 rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-build-libs-4.14.3-24.el8_7.x86_64.rpm 145ebac4456a0cd149537054ea74e323fd9eca548f38a40bd1725ac4eb9fb288 rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-devel-4.14.3-24.el8_7.x86_64.rpm 8be76765b51d8681a9f76b209d07847c27b338fe25af2b0a149502ce5b5424b8 rpm-libs-4.14.3-24.el8_7.x86_64.rpm fc4263ea61b68b93eda32fcde2612fea4537286f1e7e56fdd94db8eaae7faf8d rpm-plugin-ima-4.14.3-24.el8_7.x86_64.rpm e51a248c3608b07034f31451235312ce267e10c465585cbe633f900ddee1b0c8 rpm-plugin-prioreset-4.14.3-24.el8_7.x86_64.rpm 7eef6d9114e98909f304c2283325fc84afa6a3e22c794537eada9d1d164b53ae rpm-plugin-selinux-4.14.3-24.el8_7.x86_64.rpm 0d071d4c4a26203c48961cbeb02d2b9c5b050e29d31c36cc9e11769c50c9cf85 rpm-plugin-syslog-4.14.3-24.el8_7.x86_64.rpm 2d4cb5df2e4c19d3a4d59100777475e0e94bc1e7ddf0daf1b7c1503765621eb8 rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.x86_64.rpm ce1d5a7d9e8896e209eafb6142f22feaa70a2745e789a0b303e0dc8741fae778 rpm-sign-4.14.3-24.el8_7.x86_64.rpm 110d95fb5f5bf027f409ebe3ea455c1b3e387cde00645d970f5e716e92861e66 RLBA-2022:7825 bind bug fix and enhancement update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) rocky-linux-8-x86-64-baseos-rpms bind-export-devel-9.11.36-5.el8_7.2.x86_64.rpm 9e7f239d97615ce9f2a312f081ef94b3e9ba9c9e4f987d22e298491506c0061c bind-export-libs-9.11.36-5.el8_7.2.x86_64.rpm 35e6cd12f9d803bb60cfd7bf8a44ba73b8d0117432801d097d5851011ecd822a RLBA-2022:7828 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) rocky-linux-8-x86-64-baseos-rpms NetworkManager-1.40.0-2.el8_7.x86_64.rpm 2b70f077f0a14156c1fd2b39f9bfe7d8aa4f8824c531d0cec847948b9a309650 NetworkManager-adsl-1.40.0-2.el8_7.x86_64.rpm 37533da4a637e50dc0f2b007c0f8307e118a7b8859516725a5260c978a02943a NetworkManager-bluetooth-1.40.0-2.el8_7.x86_64.rpm 1e4939176676a6d37e3298fd1eb8f2efa9bd475a5548ff4f41d979da06e1444c NetworkManager-config-connectivity-redhat-1.40.0-2.el8_7.noarch.rpm be319eb37936b7a8d6e4d5b5bd42e0fe336b107ce90c36bdd4d42cfaea003e7a NetworkManager-config-server-1.40.0-2.el8_7.noarch.rpm 6e046436cc56ab9f86369ac70d9450227b31eecb9c9f8bd913b64b8987dcf1f0 NetworkManager-dispatcher-routing-rules-1.40.0-2.el8_7.noarch.rpm 195a4a4a8ddcd55676d48c91959b6341c437d274cc3aaf0a0555add408df8dcd NetworkManager-initscripts-updown-1.40.0-2.el8_7.noarch.rpm cda38500bd87db0d35acbce54b4272d1510cd0bfa02c646c83fcdcb48f0fa2e7 NetworkManager-libnm-1.40.0-2.el8_7.x86_64.rpm c91c9ea40b1d7f9bf486ca3dff93d248e75b5e16728a22355a4d669bf44a0b0c NetworkManager-ovs-1.40.0-2.el8_7.x86_64.rpm f1f21c942b4bd73982bc674516fe7b0d66ba9466225b7b9d3f042c4fe532b91b NetworkManager-ppp-1.40.0-2.el8_7.x86_64.rpm 87cce67b58bf84368cbe0d7646ebefc7e08b471e497adde50b6328711a3791e9 NetworkManager-team-1.40.0-2.el8_7.x86_64.rpm 79ee020f3613c5db71ddba0e8aeda4d348aeb4f31892944839a5c97e0ab87a31 NetworkManager-tui-1.40.0-2.el8_7.x86_64.rpm c2fd558daf2c12f3850eff9c200e9a984d56457fce9c2c3ad2199b260484b5c8 NetworkManager-wifi-1.40.0-2.el8_7.x86_64.rpm e1961b7dc96b48d5a236d00e1bf1cf6e18f2a6b0b3c98ae4329c63ef8b5b2f0e NetworkManager-wwan-1.40.0-2.el8_7.x86_64.rpm e1475eb16a6939449a3217c06097d13c834b797caf795a8aa8ec74f04377a411 RLBA-2022:7829 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) rocky-linux-8-x86-64-baseos-rpms libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm 2b0a25c49789fba2c51fd9ec52452072f2e540dd9d7e108d85926da97fe53a68 libsss_autofs-2.7.3-4.el8_7.1.x86_64.rpm 9315acfb31602e68f3108bbcf3ae1ce2284754d71999f0ccce2f030da526cfaf libsss_certmap-2.7.3-4.el8_7.1.x86_64.rpm ef2188a436ca5e742b9c7ff1bb048ed51970131b1b1dd15ba66a8a6ddb50ee6d libsss_idmap-2.7.3-4.el8_7.1.x86_64.rpm 2a5b2632a44438e860792c637b000391aa266103fce05495b7b415845565c8a0 libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm d56c119593e8255294782593a8752917121626d8f451d239a41ccd79238e01da libsss_simpleifp-2.7.3-4.el8_7.1.x86_64.rpm 1c961919f1a87b3314da8e29abbf24be253b6209946abd4570ff308f891f6ae0 libsss_sudo-2.7.3-4.el8_7.1.x86_64.rpm 8002f4af2b3014313e0e8b0be0e367a5870d8ff2662a86d55644c1cefbf18c45 python3-libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm 662f05c80a436c05eb93c64af5ec17a4cb40c5170887068289b4cac306d7b7fb python3-libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm 41b7414c44d384931919f598d0dccc3ebd3f354719f3394079255a88adc3561d python3-sss-2.7.3-4.el8_7.1.x86_64.rpm 42f321023b133a14290644eeb23c93ecab5d51b3e59570d8b8162607b04ab085 python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sss-murmur-2.7.3-4.el8_7.1.x86_64.rpm 01c7c36729533d921205ff7f39245aff781db0b5475fb4e672785819b9328bc2 sssd-2.7.3-4.el8_7.1.x86_64.rpm 5051d53ac5df96df4062b8004780b3134a770263c4add8e41a6361eaa7324e02 sssd-ad-2.7.3-4.el8_7.1.x86_64.rpm d82edf19f57c16e16acb145dc7d29e65dd96d4921d7972903ae96bb5ce83f956 sssd-client-2.7.3-4.el8_7.1.x86_64.rpm ab6de7cd139f88513de8ca2f01db4017c8428fa663cc899f7252de8348206c8d sssd-common-2.7.3-4.el8_7.1.x86_64.rpm 079034e36153d700d1373ad5c6d5936fe07c89cca587d2c2e04401bc7ad5954a sssd-common-pac-2.7.3-4.el8_7.1.x86_64.rpm 70d338dfcf7642581fe77829964f801ace4dcb18559f3f714f01f61b313a000f sssd-dbus-2.7.3-4.el8_7.1.x86_64.rpm b4ca2da01eed9e540352acec3c3e8303ed6b8f90585935bc7205cf1612e8d733 sssd-ipa-2.7.3-4.el8_7.1.x86_64.rpm a35fb89b88eabb04e165a074adffcc6114aec1c7ae9d85841ef31be1f0c9df83 sssd-kcm-2.7.3-4.el8_7.1.x86_64.rpm 2c2087677022939f952339173ec3f8f231ee56703df47518ccbaf46fd9f3baa7 sssd-krb5-2.7.3-4.el8_7.1.x86_64.rpm cee94b872835bab3b869702f8e33ea8021415d5f85a4fdc04dd707f84341cbfe sssd-krb5-common-2.7.3-4.el8_7.1.x86_64.rpm 71440d5c7e8f05e82c5c7fd3ee1bcf18d62670d9512d1b427fc2f10ef02d1e68 sssd-ldap-2.7.3-4.el8_7.1.x86_64.rpm 5112e64c8840bdaa795497a68b734439e12872ec5dbf16e0f0ab905268e1f6f6 sssd-nfs-idmap-2.7.3-4.el8_7.1.x86_64.rpm ae8eb40f7de0b69aa91ae2b3d2e5168d426cbfbbd9ca97809ffc4c02b9ddd862 sssd-polkit-rules-2.7.3-4.el8_7.1.x86_64.rpm 8ead8ea9bf4c7f89adf140b89a890ee59744b626e06e58a9b5c9a27fb1ec88e1 sssd-proxy-2.7.3-4.el8_7.1.x86_64.rpm 80bf29198a06a20202a7b2cde28f75f0057fdb5825e552e7db07a52e6ececf17 sssd-tools-2.7.3-4.el8_7.1.x86_64.rpm ea27ca6015d9115cd01c78560d6b36db6daf4338aeaf74879d704c5a93da1bae sssd-winbind-idmap-2.7.3-4.el8_7.1.x86_64.rpm 885103316f6ef9796189d9b294a9db757c6a52dde27ba7fecb7d249ea889453b RLBA-2022:7884 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-x86-64-baseos-rpms tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 RLSA-2022:7928 Important: device-mapper-multipath security update The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms device-mapper-multipath-0.8.4-28.el8_7.1.x86_64.rpm 750b85258e090af0345c48b148d575417c734c3831fbfdfb287d72f060d0109a device-mapper-multipath-libs-0.8.4-28.el8_7.1.x86_64.rpm 426393f34ffa65b105d0bcd82b50b3b325dac2997f9aa5d82c2cd5cc6ec858d9 kpartx-0.8.4-28.el8_7.1.x86_64.rpm 9bb96ba65f577aa1e9f6dc33dacdeb59f656368e2279615300dc00a877751cc0 libdmmp-0.8.4-28.el8_7.1.x86_64.rpm 21cdea71f7a13c24348d823ad2a906afd19a3e684dc02f45b27ff4a70dcf49fd RLSA-2022:8638 Important: krb5 security update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms krb5-devel-1.18.2-22.el8_7.x86_64.rpm 0ec00ab66e767e8e963efc06ef45c6de5829b6a2be1c155bb37a65566434f04f krb5-libs-1.18.2-22.el8_7.x86_64.rpm d37db3d2284ba491b51cdc51b33de8a66c77d065a20a6c1c1c2cf3a9090ac692 krb5-pkinit-1.18.2-22.el8_7.x86_64.rpm 3e35a025f79cabb5ef48aecc1a2b27cd2fd4bbab8bb0954461e7e5cf2109b709 krb5-server-1.18.2-22.el8_7.x86_64.rpm 1670bb4a3d45a20f68faabf0eeae2ff04b5f30924276e8d375b785a727e279cf krb5-server-ldap-1.18.2-22.el8_7.x86_64.rpm 08efd58b22a8f2ccc3adcf766ff7d88d57ebbb59b660f2a13f5b8bfca6c46645 krb5-workstation-1.18.2-22.el8_7.x86_64.rpm 2e43158f317bc4c691b4b75f441a549359c196366a15d105f2c32be86e5fbbd6 libkadm5-1.18.2-22.el8_7.x86_64.rpm 36cf1eabea81f5aa51d19cd5700ce90fba57a8ca7f0ebc8ed5a9de06ccffac6c RLBA-2022:8785 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. rocky-linux-8-x86-64-baseos-rpms tzdata-2022g-1.el8.noarch.rpm 808522f695bbe1b624724328f2ab6ff9a615a4220bb9611549fe67ccddcb383a RLBA-2022:9028 libsolv bug fix and enhancement update The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Bug Fix(es) and Enhancement(s): * Transaction picks old build to satisfy dependencies (BZ#2151895) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Bug Fix(es) and Enhancement(s): * Transaction picks old build to satisfy dependencies (BZ#2151895) rocky-linux-8-x86-64-baseos-rpms libsolv-0.7.20-4.el8_7.x86_64.rpm f4bd3dd4a66488a33d2afee06700f0ce2edafd69815c802b81838032b9e79f52 python3-solv-0.7.20-4.el8_7.x86_64.rpm bd33cc1f45bd8c1729958de030c24d5e34f4d91b5dfd4a014d19f8f967f8b638 RLBA-2023:0085 net-snmp bug fix and enhancement update The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) rocky-linux-8-x86-64-baseos-rpms net-snmp-libs-5.8-25.el8_7.1.x86_64.rpm 70d627282616e376dca8fb04c521ebe212534c15eaad0b85d2c4aaa4f8c623cf RLBA-2023:0086 opencryptoki bug fix and enhancement update The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059) rocky-linux-8-x86-64-baseos-rpms opencryptoki-3.18.0-5.el8_7.x86_64.rpm 81ed0241a7c7e8fcaa130ddc14217713b665f5dcc80ff661fa09c45f6e641915 opencryptoki-icsftok-3.18.0-5.el8_7.x86_64.rpm c4c0a41d4fd4e846b086039d97b14681890e22509430b4c8215463ab6456a3c2 opencryptoki-libs-3.18.0-5.el8_7.x86_64.rpm 8a5c295d821738c6f685732e9e1901728688835a90fd5de5df57f18e811ad148 opencryptoki-swtok-3.18.0-5.el8_7.x86_64.rpm 8f64d5ba1a4b728e58bfc68d250f93ec73c34223dc15f3df80668aeb794b9902 opencryptoki-tpmtok-3.18.0-5.el8_7.x86_64.rpm 60147a15e8fcaef749eb8a444df7da3e1a6b200baceeff2f361d515d58d3f38b RLBA-2023:0090 zlib bug fix and enhancement update The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336) rocky-linux-8-x86-64-baseos-rpms zlib-1.2.11-21.el8_7.x86_64.rpm 62fbf01029bb98f969d7c991f56f942533bb9262731ae6ec468f39eb25b30046 zlib-devel-1.2.11-21.el8_7.x86_64.rpm ead04467e2ea0e435ca8356236bd273cfd74436fac21610e24e1ae65a688d868 RLBA-2023:0094 rsync bug fix and enhancement update The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Bug Fix(es) and Enhancement(s): * rsync-daemon fail on 3.1.3 (BZ#2139118) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Bug Fix(es) and Enhancement(s): * rsync-daemon fail on 3.1.3 (BZ#2139118) rocky-linux-8-x86-64-baseos-rpms rsync-3.1.3-19.el8_7.1.x86_64.rpm b99a4736d732f9ff54b352fffeffb4a30efb86855a166b6aaaed6ccd0fab3c4d rsync-daemon-3.1.3-19.el8_7.1.noarch.rpm fb059776c3978eaa94acb4e4b0f7944756f454824eab3a3178764226c1d50fbe RLSA-2023:0096 Moderate: dbus security update D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms dbus-1.12.8-23.el8_7.1.x86_64.rpm c17880e007d8902d0513617e500be78658e6ac6faef85926926b1354e61dd3a8 dbus-common-1.12.8-23.el8_7.1.noarch.rpm d0e4859f6054c5ea4e81571f6569cad02b9700981fb122d7e2f104bce4214d32 dbus-daemon-1.12.8-23.el8_7.1.x86_64.rpm 1f9531ea623c5fa9f09bca6fbd12dde50336be5dfe51555149f140714cf86697 dbus-libs-1.12.8-23.el8_7.1.x86_64.rpm d86078baadce0e5ce0bc8ec52e446d2d1edb079e233e6488409ff190adb9ebb6 dbus-tools-1.12.8-23.el8_7.1.x86_64.rpm 3aa8722ad8a8f76baaefe8157f15059d37afa0a82a20f7624311b1758ac1442c RLBA-2023:0097 selinux-policy bug fix and enhancement update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762) rocky-linux-8-x86-64-baseos-rpms selinux-policy-3.14.3-108.el8_7.1.noarch.rpm 321ec9f773d2082212881711c4346ccd77ef92167a46cae8418da5d93cfe1452 selinux-policy-devel-3.14.3-108.el8_7.1.noarch.rpm 6f11096869a4305c31ef274c3bd2dfc1e89be4c3ce21ae09aaae8081480a6204 selinux-policy-doc-3.14.3-108.el8_7.1.noarch.rpm d9d0cf27ff71a508cb6dda32bb99f2f51772b4f681002b327e5710d7d2c53ef3 selinux-policy-minimum-3.14.3-108.el8_7.1.noarch.rpm 2dde92278499e82d3ed0bf620410e6f398bfd921838cc53716abfaa292102ebd selinux-policy-mls-3.14.3-108.el8_7.1.noarch.rpm 550c511de341ff9c24ea63e8ae9e8ac53b91b0e517ff3f417dbe6d7113794d7b selinux-policy-sandbox-3.14.3-108.el8_7.1.noarch.rpm 1119c34c00aaeafcf37bea9cd8d2013bf26286ab651a6b069d53f2ff7410eeb8 selinux-policy-targeted-3.14.3-108.el8_7.1.noarch.rpm 72864ab192aedd31c706b240d261b637f2b9fdae98c0e7ac638579ea7402c42b RLBA-2023:0098 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) rocky-linux-8-x86-64-baseos-rpms NetworkManager-1.40.0-5.el8_7.x86_64.rpm eec411750eca7cbf573724b65f37c146f2c913170b42568dd8974d2fb1cc1656 NetworkManager-adsl-1.40.0-5.el8_7.x86_64.rpm 1c156600595f9905b29944de6c4f111d4b17d60625eee81611cd0deac84bebe4 NetworkManager-bluetooth-1.40.0-5.el8_7.x86_64.rpm 1ff89568ddbb3c7fef529d2f4fc75aac12fbad32b7f4ff16017054e08669238f NetworkManager-config-connectivity-redhat-1.40.0-5.el8_7.noarch.rpm cd5378c72e78016a45d76be43a70202b6ede6826006fe1efe7762a3c00eb48f3 NetworkManager-config-server-1.40.0-5.el8_7.noarch.rpm 4d7c618d1898b37ae728a3fd4cf989463ca9fdf77041e567b60cbbac70cac043 NetworkManager-dispatcher-routing-rules-1.40.0-5.el8_7.noarch.rpm 9c4b87f46150a5d9751a10dbcb06a581d3acfacbe1075648ffbd2075f71ebc4d NetworkManager-initscripts-updown-1.40.0-5.el8_7.noarch.rpm c5c0347bd11f92b5a5cb4c618e04e1e631e69363c2ed4ff23cf4bd87c08d8847 NetworkManager-libnm-1.40.0-5.el8_7.x86_64.rpm b4a7ecb20baa043deca6b5fbe151621b331518852a50c658e6f9f8f849932afa NetworkManager-ovs-1.40.0-5.el8_7.x86_64.rpm ddde2b40770cb2ef74e0c71bf05c9044eb1f8972d51990e0d6ddb37d90d1e899 NetworkManager-ppp-1.40.0-5.el8_7.x86_64.rpm 14cfc6d4d732ebd999803b49a069455f6257fdd84e2bd2fc1a2ba6dd47053c1f NetworkManager-team-1.40.0-5.el8_7.x86_64.rpm e74f6e43eb52a8e1de059b657ed924da4273f26ff41455a58d2f94503ad9a5e5 NetworkManager-tui-1.40.0-5.el8_7.x86_64.rpm c0238998f5e4c5d9fe46e08e01c0236b829b612888552fcd2fa66a2f04f459ab NetworkManager-wifi-1.40.0-5.el8_7.x86_64.rpm 8c6fdb3c20a01ffef120e0d538910b09c6bbb17524c2d3e223a5c97f42a2be8d NetworkManager-wwan-1.40.0-5.el8_7.x86_64.rpm 17fa6f662e6e03a51a99d5a94c0b0d0ff67d92bc8ba1a3f6fc631aa76bdb7ee3 RLSA-2023:0101 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849) * vfio zero page mappings fail after 2M instances (BZ#2128515) * ice: Driver Update up to 5.19 (BZ#2130992) * atlantic: missing hybernate/resume fixes (BZ#2131935) * Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084) * Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813) * ice: Intel E810 PTP clock glitching (BZ#2136036) * ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216) * ice: dump additional CSRs for Tx hang debugging (BZ#2136513) * ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270) * After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157) * i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205) * WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953) * DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216) * Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152) * Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878) * mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957) * net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017) * Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583) * AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218) * Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374) * net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130) * iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081) * Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742) * Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912) * Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849) * vfio zero page mappings fail after 2M instances (BZ#2128515) * ice: Driver Update up to 5.19 (BZ#2130992) * atlantic: missing hybernate/resume fixes (BZ#2131935) * Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084) * Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813) * ice: Intel E810 PTP clock glitching (BZ#2136036) * ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216) * ice: dump additional CSRs for Tx hang debugging (BZ#2136513) * ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270) * After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157) * i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205) * WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953) * DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216) * Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152) * Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878) * mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957) * net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017) * Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583) * AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218) * Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374) * net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130) * iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081) * Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742) * Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912) * Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206) rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-425.10.1.el8_7.x86_64.rpm 870fe31369cee11ebea7bbbc1ded6f1f0ce94bbcbc08db360ecff02471590ad9 kernel-4.18.0-425.10.1.el8_7.x86_64.rpm 733ab5ce64e4e5a1c2485406abb3b7eee7b3b1d28cdcce124c22fd2c9e1f2387 kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm 5f88073317993ccc745d08d87c5ac76fe6cef8acc5d26a3b7349dd6b0d8f0669 kernel-core-4.18.0-425.10.1.el8_7.x86_64.rpm 0559592ef8f4de8cd61356b26deb24eeaa66b39e2db804610a508d6576627fcf kernel-cross-headers-4.18.0-425.10.1.el8_7.x86_64.rpm f91324f8849c5464d6b180856b01f7d92fb08303e4fd27b8eb4267f9b18ee46d kernel-debug-4.18.0-425.10.1.el8_7.x86_64.rpm fa7750c222eab7019e3cb84ffb92f276b7794091227a74e1dfe58717eb30cbce kernel-debug-core-4.18.0-425.10.1.el8_7.x86_64.rpm b998aaf08072c83b033c9fdfc007ec86536c64629fdbb6b654cb5a032e116b76 kernel-debug-devel-4.18.0-425.10.1.el8_7.x86_64.rpm 95b0b6e900b845fcc325d1881eb6bb4fd6aa1934f6b613c5d380b630af9bc468 kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64.rpm 05a093e7b0d8f2974b36a2ca504e6c865d407d0e07a63334cd8a44b447cbece0 kernel-debug-modules-4.18.0-425.10.1.el8_7.x86_64.rpm 97a7a2d1fa37f333e3d662184b31dc61f7b13fc77f5c9c6ca5056bdaa49dd34a kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm a509585b03297af32782eef003ce694dfd1184407a2baf06451112625a8d3eba kernel-devel-4.18.0-425.10.1.el8_7.x86_64.rpm f9d45da5eb768c0e5c89cc353337c62cadf3af528e9e7c186b15dd5dabb60aaf kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm a5841e7bb9d35f714ceaf835b19d2d07b9171354addf2353c43a3600bd0f1b3e kernel-headers-4.18.0-425.10.1.el8_7.x86_64.rpm 1aaf20a790605e08336801ebe0639090e44e3c00c80873fe5e9b31dafd662d2d kernel-modules-4.18.0-425.10.1.el8_7.x86_64.rpm 1c13477a8b745658af35fa366992b009744b0762fb978ba180eb806ef5967032 kernel-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm 66c10b1522c58c60077fa8e90e7b228b421f9cc7131c6c917595d80866c0e465 kernel-tools-4.18.0-425.10.1.el8_7.x86_64.rpm 04f9b25c9f30cc89485c38c8eb964d7a27e53ee83eb0a15eac26f8a6b05c2b20 kernel-tools-libs-4.18.0-425.10.1.el8_7.x86_64.rpm 2832e48280c73b77ccf99f28be2e036495fa393d6130dc0fcd24694d006e9ee1 perf-4.18.0-425.10.1.el8_7.x86_64.rpm 4464a8fde2e3c51b15ed5888e6b8bb2521c3617815b9d7f6bb1a4abc7aeb85f2 python3-perf-4.18.0-425.10.1.el8_7.x86_64.rpm 01dfecb23f710e29e31048ee306c8c79e0d63a6490be2e72ea15d97e98d6f713 RLBA-2023:0104 dracut bug fix and enhancement update The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. Bug Fix(es) and Enhancement(s): * booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. Bug Fix(es) and Enhancement(s): * booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045) rocky-linux-8-x86-64-baseos-rpms dracut-049-218.git20221019.el8_7.x86_64.rpm 0d6987278adf8b37c2e2bb877d1bfbd9ad44074d3da20e5dde56d8bc19cb6707 dracut-caps-049-218.git20221019.el8_7.x86_64.rpm f83f69a3dca9eaef1bee942c64c808899e40a74494d2eee3261ef581a5aee512 dracut-config-generic-049-218.git20221019.el8_7.x86_64.rpm 6db3a35458cce7bb2f170d4cdea9699d454b5c2eaeca4a3c8f923126060d83fd dracut-config-rescue-049-218.git20221019.el8_7.x86_64.rpm 9e391599c846cae54d0ba11e42b081d1ea959ac0dca02ef3bcdbb990e7c06b29 dracut-live-049-218.git20221019.el8_7.x86_64.rpm e216a054bdb694092012c2c0be40e469989174f2c783ff4bcd0327302f3bfd0c dracut-network-049-218.git20221019.el8_7.x86_64.rpm 5303aa725437754296e8dbac8a0efbf47f1bd72784ded3fe366eb407eafae816 dracut-squash-049-218.git20221019.el8_7.x86_64.rpm f18f02e40a70525f0b6cf73df191bb5e8b4a1f755c48dad9941e971ec37a1ece dracut-tools-049-218.git20221019.el8_7.x86_64.rpm 2c4d582cc864a1ecbdf5b876df0518d9078f95fde95089e6f08e2251808bbd2d RLSA-2023:0103 Moderate: expat security update Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms expat-2.2.5-10.el8_7.1.x86_64.rpm 9056a431ff2a53f8686e46007eea7f7247163d3e51bf0ac27af38b89c1102095 expat-devel-2.2.5-10.el8_7.1.x86_64.rpm 5ba825ef27e4e9ace75c9ebbff8754f76392d2e661f7f2d66b0cd7bc2474774f RLBA-2023:0105 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) rocky-linux-8-x86-64-baseos-rpms libblkid-2.32.1-39.el8_7.x86_64.rpm 5dc2f6a4284d32818de3cc95f19e0845141b905ae07c7b2cc19ba6d96c6d9a74 libblkid-devel-2.32.1-39.el8_7.x86_64.rpm 3cab9c0e6bb556eae07bbd13a24c0774d854a5b73be0cd017f82f8c484be1338 libfdisk-2.32.1-39.el8_7.x86_64.rpm 933eab8a44284ab93d40a88996a7e9a8a1f75039466ddd2ff6c1092907100fb9 libfdisk-devel-2.32.1-39.el8_7.x86_64.rpm d1bfc8f16e1b5a8ef7c033ad2ce84ebe4f8cc3e7367dd2398fb52bf0a7739cd1 libmount-2.32.1-39.el8_7.x86_64.rpm db6225656d9d772838caaf6614b621f3aba4acf4401568aa0f0fbb26f53ff34c libsmartcols-2.32.1-39.el8_7.x86_64.rpm 4e44ca814cca48b12bd7a23f875c26d0c9d10b30e7dc5d65b34a9d2be3039695 libsmartcols-devel-2.32.1-39.el8_7.x86_64.rpm c8661ef0dee4c219f624b690a601d631dec8488e744348fe49cfaecacfab3108 libuuid-2.32.1-39.el8_7.x86_64.rpm 2eb19b756eebdef3e9a9f7f82e46e3689e9015f604c54d0bac0a70d58a967d67 libuuid-devel-2.32.1-39.el8_7.x86_64.rpm 468d08ad5f52e347473566e625002e3511c3b94da07dca536daf6ab40bc69e4e util-linux-2.32.1-39.el8_7.x86_64.rpm b0e4e9d1eb9d0c1b75b58e3d126c428009e0f43de0dcb4b4ccc30915721ba5ea util-linux-user-2.32.1-39.el8_7.x86_64.rpm aa1c3c0e6688c7362932387554577abb5308022e458a216812eeedde67dad0d7 uuidd-2.32.1-39.el8_7.x86_64.rpm 516bdce9592573866ad5c930f838322b93af315727388a38b442d14f2d81eeaa RLBA-2023:0106 gcc bug fix and enhancement update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) rocky-linux-8-x86-64-baseos-rpms libasan-8.5.0-16.el8_7.x86_64.rpm 01e7735778965987fd0d4baf7a738649f7a0700a7c9e5fe5e275ae22523ea9fa libatomic-8.5.0-16.el8_7.x86_64.rpm 5de43e8039814083a1646492368e53fc262cec8f6a2026fced371b8e79d5f258 libatomic-static-8.5.0-16.el8_7.x86_64.rpm e6118b15b39adff77ab74996f6894964b02b0946efb0d626496a52ea847b83d9 libgcc-8.5.0-16.el8_7.x86_64.rpm 223e66ce39231d96a83e219ca02b96eef3c25804a4f0f6de7e9ed5062816f029 libgfortran-8.5.0-16.el8_7.x86_64.rpm 776aef1c63d9a5e444f66bee2238465937167cdd39edc7f5aeb98b54944fee64 libgomp-8.5.0-16.el8_7.x86_64.rpm b35a0924a06d8bdc38fb0ac9233bed6fc28b1a6705dafbcb2e58353a4d285134 libgomp-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm 84a3986c81659eb0bed37fb6cfa5cacb19e16079f1cb8f13e0c755fa7c1f6a2c libitm-8.5.0-16.el8_7.x86_64.rpm c9e4f8399ddbd0c3d34e2f11b14df72e8ef8eead715ecbf292829675fbbce3bf liblsan-8.5.0-16.el8_7.x86_64.rpm 55515aaf8eb97dfbe9cd297113034b0f333d182b9a24a5cadb1ba0fd894a21b9 libquadmath-8.5.0-16.el8_7.x86_64.rpm 37356951646f3bd77a49fb8a0ff5b206c8c6354c4482ef56b040c8cbd22df50a libstdc++-8.5.0-16.el8_7.x86_64.rpm 7a0f66da5d376c677914da8abe4700fd5abc496ac0769014ed32b3db8363425f libtsan-8.5.0-16.el8_7.x86_64.rpm 6f9e715af8a477782ca552f7162028d11e8ad442867ada58aa35b093a36fc649 libubsan-8.5.0-16.el8_7.x86_64.rpm ae7ec2db40c566b9b2eb278245bdd3309cb99dfbea8a5e13f2f170a3616e350f RLBA-2023:0107 dhcp bug fix and enhancement update The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Bug Fix(es) and Enhancement(s): * dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Bug Fix(es) and Enhancement(s): * dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025) rocky-linux-8-x86-64-baseos-rpms dhcp-client-4.3.6-48.el8_7.1.x86_64.rpm 1ad76df6dfd776e954d0fab9914ec40419d2d3830d3d296821c48cd0be19a58b dhcp-common-4.3.6-48.el8_7.1.noarch.rpm f934465c675e5be123b5d7f7aae7c0e894b5cd6c6cd2e73c752655f8d295bfd8 dhcp-libs-4.3.6-48.el8_7.1.x86_64.rpm a1a36c7c48f672b28f442f8b75fb7fe46bf1bb8ebfad86bf5f25b72d1960e107 dhcp-relay-4.3.6-48.el8_7.1.x86_64.rpm edab0cab469cd725369b99dd91631bafc9e9c4d21928ce9e00ac42b0be8b393f dhcp-server-4.3.6-48.el8_7.1.x86_64.rpm 7ec85283e999fc0eb1855650eeff30c3bf0fcefcc52d8588881c1f4790d13f7a RLBA-2023:0109 systemd bug fix and enhancement update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100) rocky-linux-8-x86-64-baseos-rpms systemd-239-68.el8_7.2.x86_64.rpm 2f9899eef3af510585836dcdf06eee68b8a0842697463dc214155b27f6137cda systemd-container-239-68.el8_7.2.x86_64.rpm 7076302fd4aab59b9be0486635813640b7969421d17f9123b9954235b3ec18ca systemd-devel-239-68.el8_7.2.x86_64.rpm 10606b2ae5a41f7e822f7c9df68018e5b710262ba7426840092c9eb6e4e1a27e systemd-journal-remote-239-68.el8_7.2.x86_64.rpm d433b03c864a1647aaaa30180df3de20856e0666f793356c67392dd2c8e313df systemd-libs-239-68.el8_7.2.x86_64.rpm 866449a00878ceee913f5fe86156557a6a358888ef0f6ad63a933adbc8d31031 systemd-pam-239-68.el8_7.2.x86_64.rpm 518f0455435e5b800bb42362a2412440e86ebca16d1c6d6450e608d520acde1d systemd-tests-239-68.el8_7.2.x86_64.rpm c15ab85b1a9df37e129ccf3c9bfb31350178262852f1a26dbcdcdf92759d3981 systemd-udev-239-68.el8_7.2.x86_64.rpm 25a85109d922cfa15fc8761287eebf991a1a5ada085d6458f542b1cf27081416 RLSA-2023:0110 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms sqlite-3.26.0-17.el8_7.x86_64.rpm da52f40c548a2cf17376d6f42f1f9bc0759ad20dd8cdba263f488d9d9b53497b sqlite-devel-3.26.0-17.el8_7.x86_64.rpm b93eca50687135f73465cd6b76c9f1965322bd652bde50f6195f8a7408c9bd76 sqlite-doc-3.26.0-17.el8_7.noarch.rpm 62de890713f95e66cecfbf4c9411060f95a3d58ba10b473b277294f7877ba70a sqlite-libs-3.26.0-17.el8_7.x86_64.rpm 7048c7ef6e7b5926bf70a1b467010a9694beaa2ceaa69397033d2421ff83938c RLBA-2023:0111 curl bug fix and enhancement update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493) rocky-linux-8-x86-64-baseos-rpms curl-7.61.1-25.el8_7.1.x86_64.rpm 795124f1d1bddd0bc568f720e06bbd6788a4c7553fde4b5287c41e2152908c2a libcurl-7.61.1-25.el8_7.1.x86_64.rpm 44e96dae7a32104d09ad7318327776b3efa8e7ccedc9ef9004ba3409bf51e786 libcurl-devel-7.61.1-25.el8_7.1.x86_64.rpm 87c20af4fc87fd7ab5c01221fd243a8c7f666feaf70e3422a1bcee7ec396299b libcurl-minimal-7.61.1-25.el8_7.1.x86_64.rpm 231925f734309d069301aeb0358a0befd1d7798dd0f141b887638b6d415e0e03 RLSA-2023:0116 Moderate: libtasn1 security update A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libtasn1-4.13-4.el8_7.x86_64.rpm 698f540e70ef17aa66b99cfe52f953588a46ef65059a121df858530aa78fe12b RLBA-2023:0120 authselect bug fix and enhancement update The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) rocky-linux-8-x86-64-baseos-rpms authselect-1.2.5-2.el8_7.x86_64.rpm e95dc725c549f3233a1aa63b6fc8e0c3211eceaedf210c9248c4f145739dbfed authselect-libs-1.2.5-2.el8_7.x86_64.rpm 5c0c29fd06e9ec99832db4fd1501e9d201ec08f32d0602d0388f34a8f9d42ee0 RLBA-2023:0121 libqb bug fix and enhancement update The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix(es) and Enhancement(s): * pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix(es) and Enhancement(s): * pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300) rocky-linux-8-x86-64-baseos-rpms libqb-1.0.3-13.el8_7.x86_64.rpm e0efd877528fd39ea990fa9997a11f27c657e7db9cf479f880fd027b7e53c16f libqb-devel-1.0.3-13.el8_7.x86_64.rpm 45175558d9e110d856f88c1b6b5c8beabe6a870534b4a49a31ac2fa1a1ca689e RLBA-2023:0124 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) rocky-linux-8-x86-64-baseos-rpms libipa_hbac-2.7.3-4.el8_7.3.x86_64.rpm 6b40647e7b80410117036e54ab13d4c1fcfd0feff168c9efa81cd7a294647554 libsss_autofs-2.7.3-4.el8_7.3.x86_64.rpm 2abe579c4ffdc56c97865c289d5fd1bf6d1299c4a3f455ff3fdff36dc9ebb705 libsss_certmap-2.7.3-4.el8_7.3.x86_64.rpm f1e46e67ce2c8ba2384e624bbc16e888ac49023ae54fbe6e953814d6b4cb20ae libsss_idmap-2.7.3-4.el8_7.3.x86_64.rpm 94666537c6621b86db022d639720f5e53822396cb3e192d80ee717bcf672b374 libsss_nss_idmap-2.7.3-4.el8_7.3.x86_64.rpm c0d8498d901322fcc782c5a4eab3cb178c914e5fc116f239c83f490f604e35f8 libsss_simpleifp-2.7.3-4.el8_7.3.x86_64.rpm b4c9570e3387cabec115e415799de32c218383f3f331239f62bc2af410d12dbd libsss_sudo-2.7.3-4.el8_7.3.x86_64.rpm 1139edc554703c819058d09f04a3830db31f6c7f28e968937d7880bc0ef68ef3 python3-libipa_hbac-2.7.3-4.el8_7.3.x86_64.rpm c4cd62b685bcf95b770178094d6860ed844979befa5d3500d18a7a00924fc70b python3-libsss_nss_idmap-2.7.3-4.el8_7.3.x86_64.rpm dfad347b627ba48abfa4e931827f0e1c795f3282e7a6c8c3188cda97e31d93e0 python3-sss-2.7.3-4.el8_7.3.x86_64.rpm 3e8763cfc3dd9adbd2b419368df54a093b64de01aa604cbe6cf6222593ebda47 python3-sssdconfig-2.7.3-4.el8_7.3.noarch.rpm 3f970ce3ad4b982366c148cf5018cc84fe95ef2806a4ace624ac1aeeaf83841b python3-sss-murmur-2.7.3-4.el8_7.3.x86_64.rpm 61a7c08df8bef1cf1652468a740930975e4c52f0fb9da3f08263dfc353ecb43a sssd-2.7.3-4.el8_7.3.x86_64.rpm 7c3baa320c7b740bf08bb67c55a9c790a6480f997b38e41e326d5e69608bfc12 sssd-ad-2.7.3-4.el8_7.3.x86_64.rpm 0e7992a19420b1bb74200ef92a139989ebf9b30b377f95ca6f7deaa03cc4bed2 sssd-client-2.7.3-4.el8_7.3.x86_64.rpm f4aeb3e00faf97c8b2e4f6031709791eab6acc7681e4c575daee7d5f11effd94 sssd-common-2.7.3-4.el8_7.3.x86_64.rpm d5a174d21352131d908f693cad3af713d20e5a15d8e6e2575976af4ad3031491 sssd-common-pac-2.7.3-4.el8_7.3.x86_64.rpm 88b2c379c74beb349f036be50d736a903770a9fbefa8b339cbbd867b57aa532f sssd-dbus-2.7.3-4.el8_7.3.x86_64.rpm 0c886341fc961e0adabe7540c1ab7b194cc78f41f77aef306e022cbd9cd17d4e sssd-ipa-2.7.3-4.el8_7.3.x86_64.rpm 92c10dc54edbf36335eb98ebd4dd07e2366c110d4f4cfb04953b4b6a45b2e670 sssd-kcm-2.7.3-4.el8_7.3.x86_64.rpm 64974f05f0da2a908b87df152ba2d30e1e576bf434057648e16f7a3fd851ad6d sssd-krb5-2.7.3-4.el8_7.3.x86_64.rpm 7041c2128541b7698e3193e8df7e288af978afb95d13ce103579090c41a4831a sssd-krb5-common-2.7.3-4.el8_7.3.x86_64.rpm 855a424d69ca18dd1449fbed49461a518bbc5aaa00c4be18464adaecffa7edf7 sssd-ldap-2.7.3-4.el8_7.3.x86_64.rpm 18d06837faec5cc53b9472935128a0e4e2339356a295572752ed9703c88519e4 sssd-nfs-idmap-2.7.3-4.el8_7.3.x86_64.rpm e096e1bcbb2a958600e4e5654c6652d246a3f2fc140b95c24f1277d171998093 sssd-polkit-rules-2.7.3-4.el8_7.3.x86_64.rpm c2d5b4f67b2b749328b760ac67f6797b741d2e887ab3fd35e73eb757ba3e3c89 sssd-proxy-2.7.3-4.el8_7.3.x86_64.rpm c17e69a34bd8469ea6b01ed07a3c8c5be484bf99cb547d8a3edb767cda113965 sssd-tools-2.7.3-4.el8_7.3.x86_64.rpm 10f80f84bd2147fd7fffcf1edf600bd3819380dba6c5b4fd5a9f37b645dfcd24 sssd-winbind-idmap-2.7.3-4.el8_7.3.x86_64.rpm 6ac52a9c943338d0011231dd220b3ecf6ae7c8cc9394fbc1937ec5664af2aa9f RLSA-2023:0173 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libxml2-2.9.7-15.el8_7.1.x86_64.rpm e9a71d804fc627ec77aa50b455b5b94a33504adf93d4ba8ab8b1b8284cd95feb python3-libxml2-2.9.7-15.el8_7.1.x86_64.rpm 2d53cb3dbc45a62369b67e8cebd1a83b13e85289c3ba3b3243f112ed6b2186ee RLSA-2023:0284 Important: sudo security update The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms sudo-1.8.29-8.el8_7.1.x86_64.rpm 99fd306e228fad26891792ff23712787394a9cff9907b6b82db5a11ffef4b5d5 RLBA-2020:4435 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-abrt, abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libreport-filesystem-2.9.5-15.el8.rocky.6.3.x86_64.rpm cc21df056d6c76f8b9e583b2de81e63f00203365ba633c9491666603a23920cd RLEA-2019:3448 perl-Net-SSLeay and perl-IO-Socket-SSL bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Net-SSLeay. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-Net-SSLeay-1.88-1.el8.x86_64.rpm fbb313568b089de5d9ff74e54e509dc806e49d56bdcf1fd554dbe01ca5032ad4 RLBA-2020:4499 NetworkManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for network-manager-applet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms jimtcl-0.77-6.el8.1.x86_64.rpm 9425d08b19cba3fe5a237fa7eb581debd4858414fbd4d1e722f6575cbd957caa RLBA-2022:2000 glib2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms glib2-2.56.4-158.el8_6.1.x86_64.rpm 61a796c05095a0c89ead008de79a522c0d50eff0d5870e7465fced706cf5d10b glib2-devel-2.56.4-158.el8_6.1.x86_64.rpm 69c0db06fbc8f2d68cd970a4e245dd7a541cdfdd4cf44e68b13b833e207e685c glib2-fam-2.56.4-158.el8_6.1.x86_64.rpm 4677c25392b7e27e30b0f125f412f6aac4266d9c5abe2ea35c276cd129389ebb glib2-tests-2.56.4-158.el8_6.1.x86_64.rpm 688e3e378b0c12adbd0b4d5771e65fc15090ca07f6f5a4807e08728d9dea06fa RLBA-2019:1957 python3 bug fix update Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) rocky-linux-8-x86-64-baseos-rpms platform-python-3.6.8-48.el8_7.rocky.0.x86_64.rpm 61e1bb3936eb62653e41f51499554d594a3891078c16238f92f0a17ff119cd53 python3-libs-3.6.8-48.el8_7.rocky.0.x86_64.rpm f915967824e987568d9f023811caa9c4790487160a362438e9748f9bb5016531 python3-test-3.6.8-48.el8_7.rocky.0.x86_64.rpm e278462c08b9ad22433a1af437384c718821f2f060aeecec9123c7a3346a1a7a RLBA-2019:3596 hwdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 RLBA-2019:3628 xfsprogs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms xfsprogs-5.0.0-10.el8.x86_64.rpm 7388b2eeaff6394491d86ee0437dee3d5bafba18a1c8a16746fe0fbedfa044a7 xfsprogs-devel-5.0.0-10.el8.x86_64.rpm cbdba1a641ea361706fd28907e65cf4b332ab79c9e42ebae3f4b3a1e1b29deb0 RLEA-2020:4552 atlas bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for atlas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms atlas-3.10.3-8.el8.1.x86_64.rpm 0174e214cab14f4afd0b932a736cc085660ef302d6509d6b33b9f7fa78c5dbaf atlas-corei2-3.10.3-8.el8.1.x86_64.rpm 5f5209bbeea5dddd8354fc5ddf8464c2026dcc3c5fbc833fbd1dd7b993a638aa atlas-corei2-devel-3.10.3-8.el8.1.x86_64.rpm 8fc720a1f0b8a1ca54fe5ba31c19c8ad8915ebe828375d68441a3cd53265d7b6 atlas-devel-3.10.3-8.el8.1.x86_64.rpm cfe93542853ac688548b90523511264c84e7c7fcd49831b3f7d9e724a2aeab89 RLEA-2020:5587 new package: kmod-redhat-oracleasm The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library. The kernel modules delivered in this erratum have been made available as part of the Rocky Enterprise Software Foundation Driver Update Program. This program provides updated kernel modules that add support for selected devices in advance of the next Rocky Enterprise Software Foundation Enterprise Linux minor release. We strongly recommend that these kernel modules are only used to enable specific hardware, mentioned in this erratum. Partners and customers should continue using the driver that is shipped in the latest Rocky Linux kernel for all other devices that require this driver. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-redhat-oracleasm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library. The kernel modules delivered in this erratum have been made available as part of the Rocky Enterprise Software Foundation Driver Update Program. This program provides updated kernel modules that add support for selected devices in advance of the next Rocky Enterprise Software Foundation Enterprise Linux minor release. We strongly recommend that these kernel modules are only used to enable specific hardware, mentioned in this erratum. Partners and customers should continue using the driver that is shipped in the latest Rocky Linux kernel for all other devices that require this driver. rocky-linux-8-x86-64-baseos-rpms kmod-redhat-oracleasm-2.0.8-15.el8.x86_64.rpm 44ac298ff3dec860dfc4aec171bcc9773a2e7ccbd205eb52988df8242d048bda RLBA-2022:0315 glusterfs bug fix update Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges. Bug fix(es): * Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593) Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glusterfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges. Bug fix(es): * Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593) Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages. rocky-linux-8-x86-64-baseos-rpms glusterfs-6.0-61.3.el8.x86_64.rpm 7b4395ba08f669c0ea9647e26b8c88e845d2f2f31fdb8179f56c21da74fe747d glusterfs-client-xlators-6.0-61.3.el8.x86_64.rpm a85ff13669cc25ec58dfcda4a781c07ad781e68417182f9e9e7ab0edacb88793 glusterfs-fuse-6.0-61.3.el8.x86_64.rpm 706dccc4571910a954ea3d8dd10eee3a6ca07d4053269d54059d26a7cf72afc1 glusterfs-libs-6.0-61.3.el8.x86_64.rpm 1927c8a597133b446f0e3045d0afd5d190378254c3a6c723c4c467c4f0ffb93f glusterfs-rdma-6.0-61.3.el8.x86_64.rpm 826edb740bc7ce2a2e531b04ca586d8be47ec0ec1968b8e43ca97a849e3b4746 RLBA-2022:2006 python-pip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-pip-9.0.3-22.el8.rocky.0.noarch.rpm 4dc82e21beb0c285c4a765dfe48f5df6d8ee15c38bb4d0cda37cc826a2c7e951 python3-pip-wheel-9.0.3-22.el8.rocky.0.noarch.rpm b2beb19f4cc4a7865bcc4394b24994f53c675d14865ad39bcf2bcb3ca67a2ad1 RLBA-2022:7726 grub2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms grub2-common-2.02-142.el8.rocky.0.2.noarch.rpm 6175338b02c00922aae1c9241c84ea5c71cd59bb24bec6dd84981f9f6143f9e6 grub2-efi-aa64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 3963bf6faa29aaea861bc1a256d0423698ba885faee100d9dc9b6037dc296a75 grub2-efi-ia32-2.02-142.el8.rocky.0.2.x86_64.rpm 4ffa66853d75fa0d08da238d56a41e3b031823a2aefad3d2cf5f34aa3aef184e grub2-efi-ia32-cdboot-2.02-142.el8.rocky.0.2.x86_64.rpm 1e9d6116e83e8ff9c9c7c4d49bb4d0a79db15cc3a933dd9f25a05d310e61c6ab grub2-efi-ia32-modules-2.02-142.el8.rocky.0.2.noarch.rpm b986ac569ebe723ae5bab0de5a3779a30f27752791db7cedcf71be257016768c grub2-efi-x64-2.02-142.el8.rocky.0.2.x86_64.rpm 92d1b8fb83f820c58f5aab4c1ad3fef4bf7a8e9b91176121e15dfc4902293c32 grub2-efi-x64-cdboot-2.02-142.el8.rocky.0.2.x86_64.rpm 6b3c53665f157e46cbcc0f55065dbe3bc3b0eb86c48674373252a75b8ae8696a grub2-efi-x64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 0a51865aec1df2804e25f67978bbdd93278cd4f94641afe8304e0c948373d025 grub2-pc-2.02-142.el8.rocky.0.2.x86_64.rpm f95c3537c44601b217002f501bc263fcc38da9ecffa8d2eec3eb0ed8683a70b8 grub2-pc-modules-2.02-142.el8.rocky.0.2.noarch.rpm c2374cad2069df6c2fbf3fe92b892c9bd04ebab2f8794cd38c2827b3b9c71ce6 grub2-tools-2.02-142.el8.rocky.0.2.x86_64.rpm 57efaa38fa859bb8a51b688816d16ae1dd22f4dcdd051389a9132abf6e15e7be grub2-tools-efi-2.02-142.el8.rocky.0.2.x86_64.rpm 1f3c1ed1644056fba727a2e4a58521879a0ce0c319181bf804e817e6409e5409 grub2-tools-extra-2.02-142.el8.rocky.0.2.x86_64.rpm f60e420795a561dfeff8e0187d0f439f79a1266c790699caa0bf02db728152dd grub2-tools-minimal-2.02-142.el8.rocky.0.2.x86_64.rpm 0aa50f6861020636fedae52d4df78b779d531775a30f64cb1259dd7f17fcc836 RLBA-2022:7739 sssd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm 2b0a25c49789fba2c51fd9ec52452072f2e540dd9d7e108d85926da97fe53a68 libsss_autofs-2.7.3-4.el8_7.1.x86_64.rpm 9315acfb31602e68f3108bbcf3ae1ce2284754d71999f0ccce2f030da526cfaf libsss_certmap-2.7.3-4.el8_7.1.x86_64.rpm ef2188a436ca5e742b9c7ff1bb048ed51970131b1b1dd15ba66a8a6ddb50ee6d libsss_idmap-2.7.3-4.el8_7.1.x86_64.rpm 2a5b2632a44438e860792c637b000391aa266103fce05495b7b415845565c8a0 libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm d56c119593e8255294782593a8752917121626d8f451d239a41ccd79238e01da libsss_simpleifp-2.7.3-4.el8_7.1.x86_64.rpm 1c961919f1a87b3314da8e29abbf24be253b6209946abd4570ff308f891f6ae0 libsss_sudo-2.7.3-4.el8_7.1.x86_64.rpm 8002f4af2b3014313e0e8b0be0e367a5870d8ff2662a86d55644c1cefbf18c45 python3-libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm 662f05c80a436c05eb93c64af5ec17a4cb40c5170887068289b4cac306d7b7fb python3-libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm 41b7414c44d384931919f598d0dccc3ebd3f354719f3394079255a88adc3561d python3-sss-2.7.3-4.el8_7.1.x86_64.rpm 42f321023b133a14290644eeb23c93ecab5d51b3e59570d8b8162607b04ab085 python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sss-murmur-2.7.3-4.el8_7.1.x86_64.rpm 01c7c36729533d921205ff7f39245aff781db0b5475fb4e672785819b9328bc2 sssd-2.7.3-4.el8_7.1.x86_64.rpm 5051d53ac5df96df4062b8004780b3134a770263c4add8e41a6361eaa7324e02 sssd-ad-2.7.3-4.el8_7.1.x86_64.rpm d82edf19f57c16e16acb145dc7d29e65dd96d4921d7972903ae96bb5ce83f956 sssd-client-2.7.3-4.el8_7.1.x86_64.rpm ab6de7cd139f88513de8ca2f01db4017c8428fa663cc899f7252de8348206c8d sssd-common-2.7.3-4.el8_7.1.x86_64.rpm 079034e36153d700d1373ad5c6d5936fe07c89cca587d2c2e04401bc7ad5954a sssd-common-pac-2.7.3-4.el8_7.1.x86_64.rpm 70d338dfcf7642581fe77829964f801ace4dcb18559f3f714f01f61b313a000f sssd-dbus-2.7.3-4.el8_7.1.x86_64.rpm b4ca2da01eed9e540352acec3c3e8303ed6b8f90585935bc7205cf1612e8d733 sssd-ipa-2.7.3-4.el8_7.1.x86_64.rpm a35fb89b88eabb04e165a074adffcc6114aec1c7ae9d85841ef31be1f0c9df83 sssd-kcm-2.7.3-4.el8_7.1.x86_64.rpm 2c2087677022939f952339173ec3f8f231ee56703df47518ccbaf46fd9f3baa7 sssd-krb5-2.7.3-4.el8_7.1.x86_64.rpm cee94b872835bab3b869702f8e33ea8021415d5f85a4fdc04dd707f84341cbfe sssd-krb5-common-2.7.3-4.el8_7.1.x86_64.rpm 71440d5c7e8f05e82c5c7fd3ee1bcf18d62670d9512d1b427fc2f10ef02d1e68 sssd-ldap-2.7.3-4.el8_7.1.x86_64.rpm 5112e64c8840bdaa795497a68b734439e12872ec5dbf16e0f0ab905268e1f6f6 sssd-nfs-idmap-2.7.3-4.el8_7.1.x86_64.rpm ae8eb40f7de0b69aa91ae2b3d2e5168d426cbfbbd9ca97809ffc4c02b9ddd862 sssd-polkit-rules-2.7.3-4.el8_7.1.x86_64.rpm 8ead8ea9bf4c7f89adf140b89a890ee59744b626e06e58a9b5c9a27fb1ec88e1 sssd-proxy-2.7.3-4.el8_7.1.x86_64.rpm 80bf29198a06a20202a7b2cde28f75f0057fdb5825e552e7db07a52e6ececf17 sssd-tools-2.7.3-4.el8_7.1.x86_64.rpm ea27ca6015d9115cd01c78560d6b36db6daf4338aeaf74879d704c5a93da1bae sssd-winbind-idmap-2.7.3-4.el8_7.1.x86_64.rpm 885103316f6ef9796189d9b294a9db757c6a52dde27ba7fecb7d249ea889453b RLBA-2022:7766 fwupd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms fwupd-1.7.8-1.el8.rocky.0.3.x86_64.rpm 0c9d197889ff8ef892c9764b459068350e40530311d1015a3b13ccd00d56febb RLBA-2022:7784 chrony bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms chrony-4.2-1.el8.rocky.0.1.x86_64.rpm 729f342794c6e5edd6229221abbd6bf3315491603a5715758df9bcac9272f9c6 RLSA-2022:7790 Moderate: bind security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bind-export-devel-9.11.36-5.el8_7.2.x86_64.rpm 9e7f239d97615ce9f2a312f081ef94b3e9ba9c9e4f987d22e298491506c0061c bind-export-libs-9.11.36-5.el8_7.2.x86_64.rpm 35e6cd12f9d803bb60cfd7bf8a44ba73b8d0117432801d097d5851011ecd822a RLBA-2022:7832 python3 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) rocky-linux-8-x86-64-baseos-rpms platform-python-3.6.8-48.el8_7.rocky.0.x86_64.rpm 61e1bb3936eb62653e41f51499554d594a3891078c16238f92f0a17ff119cd53 python3-libs-3.6.8-48.el8_7.rocky.0.x86_64.rpm f915967824e987568d9f023811caa9c4790487160a362438e9748f9bb5016531 python3-test-3.6.8-48.el8_7.rocky.0.x86_64.rpm e278462c08b9ad22433a1af437384c718821f2f060aeecec9123c7a3346a1a7a RLSA-2023:0049 Moderate: grub2 security update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) * grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) * grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms grub2-common-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 5b88d6f55060a730cf0f5b8688ae26c8eff68c853c842247a090d6e81c50a4b9 grub2-efi-aa64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 4f09a4d990d333e3265c18b4c0a5158e47d639596d85deecfd57a2abb8f5e31b grub2-efi-ia32-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm 5a1a04d6023f891035ec564e221f7d40cbb892f689b78d0d89bf1ef2432e8b52 grub2-efi-ia32-cdboot-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm 9563d13dc10fb2721ffe79c5885629ab702aef3f38c9756f114d2e552c66132b grub2-efi-ia32-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm defdae03ca69e0522d87a043586cf9d9935f951cb0e0ef419eaa2754992664e9 grub2-efi-x64-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm 14512f77d67ac227ad3f707d924c50c4e15c65ee39292e01443e5c3c5bfd2dcd grub2-efi-x64-cdboot-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm baaf19e256d5588739381e23c2907448b232b271cc8611c09f9a4244be1acd26 grub2-efi-x64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 96dbda0fb20996d949e00180be8c7abbb3d43e8ad2e6baf5ae0f80a16ef0aceb grub2-pc-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm 96a1084510860d5ab4f67d65b7cc51db2dfd9d49d706c65b49ff3844d705a562 grub2-pc-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm ded04f98279737ee20b5f99c735b31ab66168490b763fff0d3670e8af01243da grub2-tools-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm b0829b4f8a74457265f11cacecb25673bb0a5260d3154632c7cc58d5e4aafe89 grub2-tools-efi-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm 58a681f3c7846c5402f870260b0afb756ec051f7896ca0e44f4d788a06ce90c3 grub2-tools-extra-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm b4209dcdb8a57e6e3d0d76fd3f84d7fa8cc10e1c49b8927e79650b4ff15db705 grub2-tools-minimal-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm 34e839cf72b78f2bef2a1a9bf867b94eb11b2b0006f21cb0181cb3c2bb15238f RLSA-2023:0625 Important: libksba security update KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libksba-1.3.5-9.el8_7.x86_64.rpm 13b0d50a82d975654e0a1a83b81b33380ba77f84763885674de4bed7a4631ebd RLBA-2023:0658 kmod-redhat-oracleasm bug fix and enhancement update The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library. Bug Fix(es) and Enhancement(s): * Rebuild kmod-redhat-oracleasm against kernel version 4.18.0-425.10.1.el8_7 (BZ#2155759) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-redhat-oracleasm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library. Bug Fix(es) and Enhancement(s): * Rebuild kmod-redhat-oracleasm against kernel version 4.18.0-425.10.1.el8_7 (BZ#2155759) rocky-linux-8-x86-64-baseos-rpms kmod-redhat-oracleasm-2.0.8-15.1.el8_7.x86_64.rpm ea1058a1f05e8818d54a0ce3cf8b849760a242481f88b3e2c4c6f7f3e9a93891 kmod-redhat-oracleasm-kernel_4_18_0_425_10_1-2.0.8-15.1.el8_7.x86_64.rpm 76860217265725d828a4d399ba2825387472ff7bbdc04f9f3e94ac51d674626c kmod-redhat-oracleasm-kernel_4_18_0_425_3_1-2.0.8-15.1.el8_7.x86_64.rpm 68272f11899af1eab903d3f733890ecc610f742ffc67166432c667182568ab13 RLBA-2023:0830 iptables bug fix and enhancement update The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * Rocky Linux8.6 Packet drop in ebtables (BZ#2144922) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * Rocky Linux8.6 Packet drop in ebtables (BZ#2144922) rocky-linux-8-x86-64-baseos-rpms iptables-1.8.4-23.el8_7.1.x86_64.rpm 97d31943ea173ebb9fa2b5389f246c4ea66ee007b6f997e0721a35f1b695f3a9 iptables-arptables-1.8.4-23.el8_7.1.x86_64.rpm 3f9b7a6f683a0fd775de7206283bdc38051fe5b7f85a54d87518d791dc4076df iptables-devel-1.8.4-23.el8_7.1.x86_64.rpm 9700ec49f7c06cca19941362b3c140259d303c91b91f442f9ed8076ae7602d1d iptables-ebtables-1.8.4-23.el8_7.1.x86_64.rpm 073d34183b084194b6871db214b730af3ae7fa1bb69a32ee85b034c76051dc5e iptables-libs-1.8.4-23.el8_7.1.x86_64.rpm be1946a383469ae5dc437589d216eea4f85842c9511ab9ab366b3a0b7c928d29 iptables-services-1.8.4-23.el8_7.1.x86_64.rpm 5ed063733d02daf590448d770d6ea0b6eb77cf9dffb6cd70c7e424e61a270c0c iptables-utils-1.8.4-23.el8_7.1.x86_64.rpm 4e9871505d38d5c6d710d82ba0797a8d060e11a9e803022d38f64919afe9e901 RLBA-2023:0831 nfs-utils bug fix and enhancement update The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899) rocky-linux-8-x86-64-baseos-rpms libnfsidmap-2.3.3-57.el8_7.1.x86_64.rpm da85dfd1afa352bb9695310801b0b0ebd06bc6d8689c6ad3ad2da9b7ebe2c2ae nfs-utils-2.3.3-57.el8_7.1.x86_64.rpm b0979c15176774f349a8730d476ed50908d1e1b3211ddfce8e9a7fa661515a68 RLSA-2023:0832 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586) * Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592) * Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580) * MEI support for Alder Lake-S (BZ#2141783) * Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959) * Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287) * Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474) * i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745) * Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530) * error 524 from seccomp(2) when trying to load filter (BZ#2152138) * Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734) * Connectivity issue with vDPA driver (BZ#2152912) * High Load average due to cfs cpu throttling (BZ#2153108) * The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230) * Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653) * kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460) * Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272) * Azure: VM Deployment Failures Patch Request (BZ#2155280) * Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289) * MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437) * GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797) * Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905) * Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813) * ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182) * (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221) * i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460) * iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586) * Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592) * Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580) * MEI support for Alder Lake-S (BZ#2141783) * Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959) * Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287) * Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474) * i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745) * Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530) * error 524 from seccomp(2) when trying to load filter (BZ#2152138) * Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734) * Connectivity issue with vDPA driver (BZ#2152912) * High Load average due to cfs cpu throttling (BZ#2153108) * The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230) * Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653) * kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460) * Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272) * Azure: VM Deployment Failures Patch Request (BZ#2155280) * Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289) * MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437) * GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797) * Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905) * Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813) * ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182) * (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221) * i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460) * iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257) rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-425.13.1.el8_7.x86_64.rpm 5a567569cedf4f7c6ea2e588487dc37c9c6f30a05b8bcca45da740c569b712ab kernel-4.18.0-425.13.1.el8_7.x86_64.rpm d4295895806bdc8fe95e5c95e7d9bab99bb044b9583b12d6373f50cfc7eb179c kernel-abi-stablelists-4.18.0-425.13.1.el8_7.noarch.rpm 112fd585aeb8f69a65d5191dfb7710c00a2fa0818413eb730a52c519c9e798a6 kernel-core-4.18.0-425.13.1.el8_7.x86_64.rpm 6949643abed2c947735dffd559b972648fb2bdbc642a6bdcc7ef0f65e6b1895b kernel-cross-headers-4.18.0-425.13.1.el8_7.x86_64.rpm dbbd9d450eb4159387e8cdc7158a1005253732ec5850bf807c50775ebb263e1d kernel-debug-4.18.0-425.13.1.el8_7.x86_64.rpm bfed537ae29f64d93799ac20dc41198b707801f7f172e9cdd03179c33f712d8d kernel-debug-core-4.18.0-425.13.1.el8_7.x86_64.rpm b437d5e3e404ad466d8b63d0b57fdf27ed399ef995fc523585988cda3342b6d5 kernel-debug-devel-4.18.0-425.13.1.el8_7.x86_64.rpm 8e9e17c769a7577eed7207f3fa435c490b89796ce1234d9a8588dac48afb1420 kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64.rpm 61abd26b67195663011c739beb2b224534a31d23eeb6b7cbde9b2c7b0aadf016 kernel-debug-modules-4.18.0-425.13.1.el8_7.x86_64.rpm 1b85f82a3b8c641695adf265030b153e0bb6692d51b93849cee1fb5bab912755 kernel-debug-modules-extra-4.18.0-425.13.1.el8_7.x86_64.rpm 308d75e14bf95409855d9f55d2ca96c33462a6048c363e6aa5ff105ba582b6eb kernel-devel-4.18.0-425.13.1.el8_7.x86_64.rpm 21d5e8a2600b7fafcf68f8ffe6abacac9e110f6be8420b3af7270e106060ec83 kernel-doc-4.18.0-425.13.1.el8_7.noarch.rpm d29d0316ba11bbbfb22ebf404f6aa18c7d6f67d1cb3d705b22918ebbe1e272a6 kernel-headers-4.18.0-425.13.1.el8_7.x86_64.rpm f72590eca43e899d3f62328eacaefc5e591a56c2a44fc9e122e16b7ff8661330 kernel-modules-4.18.0-425.13.1.el8_7.x86_64.rpm 9ddb6105eef3fc0d3dfdf76c0bf439327b7e1d6bbdd164cede97732c850329be kernel-modules-extra-4.18.0-425.13.1.el8_7.x86_64.rpm 537b843f074cab438c0bbbd45825d54c5220dc94ab99b2c97edbc4b81dd7c737 kernel-tools-4.18.0-425.13.1.el8_7.x86_64.rpm 861fcf559d901ad8850fdbb30787c1e61811fea5493502c03b9cffbe2f1f8c7c kernel-tools-libs-4.18.0-425.13.1.el8_7.x86_64.rpm fc9d43339480cebd5769caada7387524658fca8a7e4662edafecf27a80510ce1 perf-4.18.0-425.13.1.el8_7.x86_64.rpm 7bb18c9edc571b4841ac5da0a8b9536fad0479bff26efd951b6e821457577400 python3-perf-4.18.0-425.13.1.el8_7.x86_64.rpm 8de4c04d6cece4fe8680c3c5e715486dc54ea723f67d9464d2a8d338aafce1b9 RLSA-2023:0833 Moderate: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm 4eaf62a1cfd3e2a3236e34fa66f8f1086cabeb71040021a5ff79dca95f959f91 python3-libs-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm c3d965c8baa421e4465ad92be8738482958c4ab55b285acd8db6b4d69fddfa8a python3-test-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm 15e9d64277e97b66a6c0cf0ac581d985205d9587489b8bc37a25d747b0aa3247 RLBA-2023:0834 kmod-kvdo bug fix and enhancement update The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es) and Enhancement(s): * Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es) and Enhancement(s): * Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783) rocky-linux-8-x86-64-baseos-rpms kmod-kvdo-6.2.7.17-88.el8_7.x86_64.rpm 5a80977949d46a8e5085491d43e28ef2d20519883b0ccccc8edc61139de66854 RLSA-2023:0835 Moderate: python-setuptools security update The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-setuptools-39.2.0-6.el8_7.1.noarch.rpm 79df645d4964ddd0977ff1df4c6eab07573681474107927e5c1a236a8db7682e python3-setuptools-39.2.0-6.el8_7.1.noarch.rpm 086432d50e40817e2dc2c45c54f60802f4368f5bde2949757f65804f48c9120b python3-setuptools-wheel-39.2.0-6.el8_7.1.noarch.rpm a088f6171dec158f26bf60f942294f5ec8ba1f30f447f3828ff201b59a87a19e RLBA-2023:0836 OpenSSH bug fix and enhancement update OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) rocky-linux-8-x86-64-baseos-rpms openssh-8.0p1-17.el8_7.x86_64.rpm 05b6cb94628abfde46a888ff467ff895b72255e318d60b6e56cef934ccc6773c openssh-cavs-8.0p1-17.el8_7.x86_64.rpm 5ed6a37b7db8503c7bdde856cf49904531d78878e5340e88d43528258d0ba463 openssh-clients-8.0p1-17.el8_7.x86_64.rpm f99eb73f6f0e5bc0629e3d1a824d3706841ae98dbcff2b169e6b54b076b6db2e openssh-keycat-8.0p1-17.el8_7.x86_64.rpm c40243ec966f1e1bf36aa5f8d1529fbc8e6b64c70058f86c082fa45c54850079 openssh-ldap-8.0p1-17.el8_7.x86_64.rpm 594f3959565141e894a3dae7ad4a4d409e475c7bc4dc5c3ed786978c21994fc3 openssh-server-8.0p1-17.el8_7.x86_64.rpm 127c4130240a6295ec9699f0485fe4505f380fda8660bbee2e1625eca8e3e6e4 pam_ssh_agent_auth-0.10.3-7.17.el8_7.x86_64.rpm 5460a2de12107bf9e83e804bd667c9d329605f6ee44cb18bae68784bfada5972 RLSA-2023:0837 Moderate: systemd security and bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd doesn't record messages to the journal during boot (BZ#2164049) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd doesn't record messages to the journal during boot (BZ#2164049) rocky-linux-8-x86-64-baseos-rpms systemd-239-68.el8_7.4.x86_64.rpm 4570fb885df57f65d9e3840f60253f6eb96759ab9f7a890d85c1403a42e4059c systemd-container-239-68.el8_7.4.x86_64.rpm d27b57e269000afc18af1b2a1d0bda777406fbfd7f257a900d0d3e77d00138f6 systemd-devel-239-68.el8_7.4.x86_64.rpm fd4044d117e6b6af19b9a27fe5a996cbe8da367c8165cd2c1a9527f32813ab6c systemd-journal-remote-239-68.el8_7.4.x86_64.rpm 62145940f536b2c8ed3b4a5632df5b8385c36773148893c9071a60f74bf3bfc4 systemd-libs-239-68.el8_7.4.x86_64.rpm 22e74ab19875536ea8ef5e8fb739c3dea8e3642b66cb77fa205e1398f48e8b2a systemd-pam-239-68.el8_7.4.x86_64.rpm 356487ffaca88133d8e09a98dd2fcb9f5be0ddc74dd17c716671a3725a3e23b3 systemd-tests-239-68.el8_7.4.x86_64.rpm 2c4980c7f64f4fe56d392346f6884209b51dc94f7432c46df343ca76071eb0ed systemd-udev-239-68.el8_7.4.x86_64.rpm eb0fb3bbfdebe5c3de2e29ff21b817e2acaab13b979a4923236516ade3ed7bc6 RLSA-2023:0838 Important: samba security update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms ctdb-4.16.4-4.el8_7.x86_64.rpm 3e323c101092468ae7da5a7b2a4839e4bf8ba285f3e2d0b1adb75e445da94d28 libsmbclient-4.16.4-4.el8_7.x86_64.rpm 8481d62fa3336fc9c870eeb48aaaca4bc3b59bb62a3cba80ef29c0599f03ad87 libwbclient-4.16.4-4.el8_7.x86_64.rpm a34de817747f178da58fa3bffdbc220b4047e0ee72e61453506796a4274f96c8 python3-samba-4.16.4-4.el8_7.x86_64.rpm 7aac04965e10d8859dea3cefef5bd4da7316b9b1950809e6cbe8fd93267fce86 python3-samba-test-4.16.4-4.el8_7.x86_64.rpm 95e9014204cdcad709b4902e3032167d238e212e176fa232a7f8ae5e5d7db5ce samba-4.16.4-4.el8_7.x86_64.rpm d5b6a420c4230744222ae054e094738b57c6d2f18c3de5f019c7c19fe368e4bb samba-client-4.16.4-4.el8_7.x86_64.rpm 37eb1a7e2428501ba9af75749751963cfa6418daf28cb2faabd636eec6da407b samba-client-libs-4.16.4-4.el8_7.x86_64.rpm c15d47a95fac4795b0ac703e0ff3a0240c2f88c5e1142fd35f7c7f0d4744b5e1 samba-common-4.16.4-4.el8_7.noarch.rpm 920a53593c8fc91fbcb9b53fda376f997eaf9ebc446e682369e57001c749c535 samba-common-libs-4.16.4-4.el8_7.x86_64.rpm 49c9ba71012de2eaece7bdda88962595553ab0c9b0599530f4452da3fe8f89bd samba-common-tools-4.16.4-4.el8_7.x86_64.rpm 021444294bfc84f1d7173cf14dd97a30a18e136593ed48ebe4009ae8e90ee5dc samba-krb5-printing-4.16.4-4.el8_7.x86_64.rpm 2b9900678a6c53e6f306799c818fd002c74e608f7ba5b050728f7154bfff3889 samba-libs-4.16.4-4.el8_7.x86_64.rpm 48cca028d3bc571664202481e682720917382cb888a5205b77d85b53676bd25a samba-pidl-4.16.4-4.el8_7.noarch.rpm b4ed5fcbf7bb9802c768852c4a23821a354feb7440f5cc28df778882400c41d4 samba-test-4.16.4-4.el8_7.x86_64.rpm 936dd3c596eb9003bcd0dde0132c4619b6f782688b4e649ba10cee26087e1858 samba-test-libs-4.16.4-4.el8_7.x86_64.rpm c36c0b08a4b893b28daeb9f30196113eafe23be4d9942bc747e5142434248943 samba-winbind-4.16.4-4.el8_7.x86_64.rpm 18ff309fc462b70631a5564bed68044625271e95f3865ef3462d8be880218235 samba-winbind-clients-4.16.4-4.el8_7.x86_64.rpm a4f11fa8b60046bf49bb7888f83190d44fd0e83e1655ffc387c9df693898052b samba-winbind-krb5-locator-4.16.4-4.el8_7.x86_64.rpm 4a31984bca3d407d5dace83534452dfa9bc2513c9816929011a355eabdeeb531 samba-winbind-modules-4.16.4-4.el8_7.x86_64.rpm d735e5573c44d8fe4963eb6d97ec17ef083a3c4cad9cb991ed0de6e38a0d92d3 samba-winexe-4.16.4-4.el8_7.x86_64.rpm cbbe1ae079685316ab452cd62f9c3b17ae3e64c20d8d914a5829c8bceaf56113 RLBA-2023:0840 curl bug fix and enhancement update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * curl fails large file downloads for some http2 server (BZ#2167825) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * curl fails large file downloads for some http2 server (BZ#2167825) rocky-linux-8-x86-64-baseos-rpms curl-7.61.1-25.el8_7.2.x86_64.rpm b7bfb42bf7e2ad81c14a5942f31cf59d1fd4eb32f20b7448e9872dc7543e45bb libcurl-7.61.1-25.el8_7.2.x86_64.rpm 65c3664a0bda934c2c04cc258896c4d7c0493245eae19fd311942142e5c61f7a libcurl-devel-7.61.1-25.el8_7.2.x86_64.rpm 3231b00cd2b2bc5dc0c3467355c26f971e512a8610c34fa288bc64df1b6a05b7 libcurl-minimal-7.61.1-25.el8_7.2.x86_64.rpm 9ce59b8aa7261966e7ee3ec1c4097dd6fee2eab0fac635d1dd6a4151545fcce1 RLBA-2023:0841 grub2 bug fix and enhancement update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es) and Enhancement(s): * HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es) and Enhancement(s): * HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411) rocky-linux-8-x86-64-baseos-rpms grub2-common-2.02-142.el8_7.3.rocky.0.2.noarch.rpm d9144ef96e60849f7499704dccc1769bf2e202b10c020e8e60e990a94073c7a5 grub2-efi-aa64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm c35195531f6ad155e0bbb19a5cbdb30ea89aa1088eb0aec40af8cc31c4753f4b grub2-efi-ia32-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm e95fc32333e2b638bde9bb5a36759cac44d9921c2db9ea3cd6362998ced2d8fb grub2-efi-ia32-cdboot-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm d69659825041b8b7b50bbceb0c3f676279c66414857fe7a048342e71b9bc4d36 grub2-efi-ia32-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 0a31dfc5494ba26886bb20882418e884a2f4fc51ecf2cc3bbf33c51e86b05571 grub2-efi-x64-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm cb7cf6e87fc670dcaaef3cd38f1775c573f711ca22b319ca5cc6583fe2f5ba0a grub2-efi-x64-cdboot-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm 9d0c14ffce7ff4348e1bb9206318d4611643458b45b72adaeb8e76c9835402b3 grub2-efi-x64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 53b84245064eb9a42bae0cc85e1fa43b7871085446b813bcf71dfd0c734acb29 grub2-pc-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm a9ecba58f77bc8b2fce92074e73e4ba8be1631c105c6d2f1f1e7c86ee43b1f70 grub2-pc-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 8d96bea14500c3f01fc24e2c37ae18dfa8f92c27c0b0721ff923d568b6ed8400 grub2-tools-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm fd20cd0d63526cce1f68aa695939040bc9b0cec43291d49eb5c5f6f3ef97f4fa grub2-tools-efi-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm d1cfaaf2baf92e6a090d6fc77e9c043050844e3167653e2b82c367e57ee7122c grub2-tools-extra-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm 6a0296766622f44cc914c9457a9150b4aaf54445f36eb04998bba5d0f0bb3a24 grub2-tools-minimal-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm 3ce72ed30d0b5260da067abf546246ea7a73525f0b0798a873aab7c5dd0e6071 RLSA-2023:0842 Moderate: tar security update The GNU tar program can save multiple files in an archive and restore files from an archive. Security Fix(es): * tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU tar program can save multiple files in an archive and restore files from an archive. Security Fix(es): * tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms tar-1.30-6.el8_7.1.x86_64.rpm 7957bc9ed49b36674b462b2d20b0d1522070cb789d767d420a2672fcec79e798 RLSA-2023:1140 Moderate: curl security update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP multi-header compression denial of service (CVE-2023-23916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP multi-header compression denial of service (CVE-2023-23916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms curl-7.61.1-25.el8_7.3.x86_64.rpm e94b29f4ccaa93bf67f376cb08e065688d42f1f65d1561df1563fb9bff92c077 libcurl-7.61.1-25.el8_7.3.x86_64.rpm 3bf6e412d40b46ac4b2f757fc5b1b25375a6dba10e6e75df84565cc03a0d4ab3 libcurl-devel-7.61.1-25.el8_7.3.x86_64.rpm 3c3b544ddbbd6b700ee7cecdd2970aa2ea5dc8f61cc1faad75931e5d9c288dec libcurl-minimal-7.61.1-25.el8_7.3.x86_64.rpm 5fcf3360382094bf6267481626e021acf15b8c89a2f8a71f11a09dbbdb4aac63 RLBA-2023:1300 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655) rocky-linux-8-x86-64-baseos-rpms sos-4.5.0-1.el8.noarch.rpm 09cecb873d49432c060f6a8e741833a7cbe0ddae4d2cee238694b9c3dd7eaed4 sos-audit-4.5.0-1.el8.noarch.rpm d11f01fb828ef8de3e04bcc64f976a61fe0955eec21da53e379a03263f9254bf RLSA-2023:1405 Important: openssl security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms openssl-1.1.1k-9.el8_7.x86_64.rpm 9a938d81016ef3c3e733e4769e188999fbbfcdec71318a4698e1040d28867770 openssl-devel-1.1.1k-9.el8_7.x86_64.rpm 7b1d407a69745004f56fa33cd2d345f1a84f9e8710ded5e0265dacbd4cc4e150 openssl-libs-1.1.1k-9.el8_7.x86_64.rpm 1773916c99960d474e56f6ee2e7f2b94a3fa536a5fe12e4445bea0e34ea6ba01 openssl-perl-1.1.1k-9.el8_7.x86_64.rpm aac00ecf8f661033d59a38fa9944b36780c0e5bc64fb7f00c1ae2a249b8840ab RLBA-2023:1565 device-mapper-multipath bug fix update The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es): *Multipath segfault after running newest patched version (BZ#2161393) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es): *Multipath segfault after running newest patched version (BZ#2161393) rocky-linux-8-x86-64-baseos-rpms device-mapper-multipath-0.8.4-28.el8_7.3.x86_64.rpm 64703fc5ab66132cbecd8fee01cb99e47478e03e59d6734a03f7ff03d0597164 device-mapper-multipath-libs-0.8.4-28.el8_7.3.x86_64.rpm 815c4941b909fb5eaba3b8969dadfb11754ad19831b040aef95c5e200545fd48 kpartx-0.8.4-28.el8_7.3.x86_64.rpm aaa18469140d1383e3f2eafbcdaa0e4961a58e0a347626e12556df1ab96f5a9f libdmmp-0.8.4-28.el8_7.3.x86_64.rpm 982d0163a217206f174f5614881430114ccbdfd8dbd6538a0edc493241632c27 RLSA-2023:1566 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770) * Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170) * AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275) * Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750) * Kernel panic observed during VxFS module unload (BZ#2162763) * Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587) * Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296) * kvm-unit-test reports unhandled exception on AMD (BZ#2166362) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368) * Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665) * panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602) * net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640) * Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645) * mlx5: lag and sriov fixes (BZ#2167647) * Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776) * GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896) * Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228) * fast_isolate_freepages scans out of target zone (BZ#2170576) * Backport Request for locking/rwsem commits (BZ#2170939) * ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550) * Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103) Enhancement(s): * Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770) * Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170) * AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275) * Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750) * Kernel panic observed during VxFS module unload (BZ#2162763) * Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587) * Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296) * kvm-unit-test reports unhandled exception on AMD (BZ#2166362) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368) * Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665) * panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602) * net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640) * Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645) * mlx5: lag and sriov fixes (BZ#2167647) * Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776) * GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896) * Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228) * fast_isolate_freepages scans out of target zone (BZ#2170576) * Backport Request for locking/rwsem commits (BZ#2170939) * ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550) * Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103) Enhancement(s): * Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384) rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-425.19.2.el8_7.x86_64.rpm e7c94ef18c138d559ca2f22e646a903384b385dec32d59f254cc7d26ffbdadf5 kernel-4.18.0-425.19.2.el8_7.x86_64.rpm c729ed610919c93f864208abaa01415b4c97921850ccbb6b4ef71f0a5c65ba28 kernel-abi-stablelists-4.18.0-425.19.2.el8_7.noarch.rpm 42e95052460987534f500f7d2475155e2253339a854c66081b660da0e93a2963 kernel-core-4.18.0-425.19.2.el8_7.x86_64.rpm b8f62457ce99fde135ee6def380c4087ee6abde840cadb9536e978e6560e6884 kernel-cross-headers-4.18.0-425.19.2.el8_7.x86_64.rpm 436a50f7193328f9628475eaaf3535dd1b490666236146a1dbe988e734b62501 kernel-debug-4.18.0-425.19.2.el8_7.x86_64.rpm 4857ba6f6b3e89da3f42d9cc3e8dd97f4439ea3533d06c21d45d631ff6f02291 kernel-debug-core-4.18.0-425.19.2.el8_7.x86_64.rpm 83617a3330cbd93a214fc74ba4b656cdf4916540a71e8c54fcac3a755b29008f kernel-debug-devel-4.18.0-425.19.2.el8_7.x86_64.rpm ddb9c75682453f0dac4bd37540dcb37b9fa367ea2f7889dcff18dee2ca22838a kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64.rpm ab5fbe04e87180e71b07fdd51cbc0b71763f0b67d26e799064b59de5f24bd51a kernel-debug-modules-4.18.0-425.19.2.el8_7.x86_64.rpm efba853ecfd14e7c271c0353ff9eb84ba7ab9f882d6775b7f48c7c88cb8f4706 kernel-debug-modules-extra-4.18.0-425.19.2.el8_7.x86_64.rpm f82fda6617bda86ac0494f7e743a56c6163a4806eb8a25dfcb88663a1a1cca1a kernel-devel-4.18.0-425.19.2.el8_7.x86_64.rpm 050e1c1323bf319aa4617b94675464ad77a07e3f54cc7b8550adc30242e24009 kernel-doc-4.18.0-425.19.2.el8_7.noarch.rpm c72d6e283b89b4330922b34ba4cf3dbda58d9e847fd00d75d963d139ea2c53c9 kernel-headers-4.18.0-425.19.2.el8_7.x86_64.rpm d0eb4977e942db3d6a07f1e0797ec243af1a7e2fd72fc10308f0fe1a13f227b5 kernel-modules-4.18.0-425.19.2.el8_7.x86_64.rpm 42db8452c0ce91d2bdb279e1015405a109d2171373fad1a2de04ad6871df86cd kernel-modules-extra-4.18.0-425.19.2.el8_7.x86_64.rpm 15c24631eaf525ae241b2bbf0d1183e0a737cb4b715e8c6902a291d661fc0ffe kernel-tools-4.18.0-425.19.2.el8_7.x86_64.rpm a6fef183dbd6a420193cb8dc890990fa0aab12a5d0b198f8afb55db0b4c9d4f2 kernel-tools-libs-4.18.0-425.19.2.el8_7.x86_64.rpm 3df2788f8b1f651eedb5491ff8cd1ef2402cef90c822d0317f6dbebdc9bacdcc perf-4.18.0-425.19.2.el8_7.x86_64.rpm f54d6c1e1310c6cc5ba83f34f53307939bf500a1621cdc04ce3b7b84efdd36c8 python3-perf-4.18.0-425.19.2.el8_7.x86_64.rpm e0324a5dbce6e51ce6939c628f2c21858e6c39fdd3fbc4693062ccad3ceea47b RLBA-2023:1567 samba bug fix and enhancement update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394) * ctdb should have dependency for package samba-winbind-clients (BZ#2170467) * Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468) * samba-tool reports an uncaught exception (BZ#2170469) * Ship new samba subpackages (BZ#2173975) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394) * ctdb should have dependency for package samba-winbind-clients (BZ#2170467) * Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468) * samba-tool reports an uncaught exception (BZ#2170469) * Ship new samba subpackages (BZ#2173975) rocky-linux-8-x86-64-baseos-rpms ctdb-4.16.4-6.el8_7.x86_64.rpm 54f2020578129c0ca43e3d985e5f3c8ac0ab65dfa1d89767de4b46c5981dbdca libsmbclient-4.16.4-6.el8_7.x86_64.rpm 8c6745dc30e7a7801106f434a6fd1143e71384bf66b6cb9a9b9b967c4d53f67e libwbclient-4.16.4-6.el8_7.x86_64.rpm d08718f1efe3bb47cd8cf79f886d43bef3acb1ee0663a12c75fdaf1344241b8b python3-samba-4.16.4-6.el8_7.x86_64.rpm 720204669b1b1344cd65c448adac9b214195990f664b98b85b6a1fe1aafd06b8 python3-samba-test-4.16.4-6.el8_7.x86_64.rpm 1f36b8adc3e669b48061b0f7a822c82ab0dc7f1c3631b76eb5fa8a2627426d6e samba-4.16.4-6.el8_7.x86_64.rpm 1a4b0e2ba34cbf6c5eb92bfa0a35c5e8a8e9fdbb1ed4bad33a10c4b650655c71 samba-client-4.16.4-6.el8_7.x86_64.rpm 64ed2e3c5fd7e0397d7261707fef9250f86b4664e088c5316ff318f674946ff9 samba-client-libs-4.16.4-6.el8_7.x86_64.rpm f4d61ef915fd2a98c42989fe8c179af770a5476706d615391df5a47fdcb41029 samba-common-4.16.4-6.el8_7.noarch.rpm 97d51a6b773106001a616d443beb10dc4f2720de02c2cdebe92cc6fb33289395 samba-common-libs-4.16.4-6.el8_7.x86_64.rpm 668543d5621f4f993b0e6375025e643b1d722e96e8b55d83be6e4238ffa436bc samba-common-tools-4.16.4-6.el8_7.x86_64.rpm 5f3e679a20ef595027602860be82819b5bc8e58d02b6fd18773113de900cf42c samba-dcerpc-4.16.4-6.el8_7.x86_64.rpm 88edcf0b0f6651cdc68b6a44cb98302a5bb87a4154fb27f7bc7335d2260d3d54 samba-dc-libs-4.16.4-6.el8_7.x86_64.rpm ff10faaf34f2f9964121596baee51482ed51822207d146329b64b0d0cb1621d0 samba-krb5-printing-4.16.4-6.el8_7.x86_64.rpm bd02588ef1bb9c8af4a84463287ee027b12e0316d73d3760e9215452fe06ad6e samba-libs-4.16.4-6.el8_7.x86_64.rpm 6363a01eb86d79b822b41ae4f25daef4e941fc20aa9555b89abd2dd565972ee6 samba-pidl-4.16.4-6.el8_7.noarch.rpm 934707d614ffd5c2222c70f953a539bc8b92ffc4b75414a8ad034e53d82ea84e samba-test-4.16.4-6.el8_7.x86_64.rpm cc33da8640765be111af1d8cd12d473b834c51505ab94f9d9e3c0f10d64c9a9f samba-test-libs-4.16.4-6.el8_7.x86_64.rpm d809aba8393fc812674446ce75e6c332bfe27fab66234d2e3e1587dc5d6d3e46 samba-winbind-4.16.4-6.el8_7.x86_64.rpm 1275eb113fd8a64b465b20965447009c911faa38fa1ea5d93e6a7d5ae141dafa samba-winbind-clients-4.16.4-6.el8_7.x86_64.rpm 1967de4b51f9579817bb82ec702fa6888fd8b6f7895b67a77fad8bc2fe7262d5 samba-winbind-krb5-locator-4.16.4-6.el8_7.x86_64.rpm 20c145f5cb4a59941b3537f858dc8a3ecb771d4ab6c4a912527496aae1615a91 samba-winbind-modules-4.16.4-6.el8_7.x86_64.rpm 273edf803ccaadf53b7e4c422f0d5cdbee3f1fa29200e3a2605359f3f697d050 samba-winexe-4.16.4-6.el8_7.x86_64.rpm b84b22b41da3615d30d04f00c4a56306ee3fc82b45fa962171121ba59671903e RLBA-2023:1568 selinux-policy bug fix and enhancement update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510) rocky-linux-8-x86-64-baseos-rpms selinux-policy-3.14.3-108.el8_7.2.noarch.rpm 2013aed46a43d0a5dc40c88703d4d87f417fac5e30b5fc4a0aa22f971e85839c selinux-policy-devel-3.14.3-108.el8_7.2.noarch.rpm 862b21fb9d39d528ba3c4706401063f5cd769ddd246aeb2784f0bc204833d5cb selinux-policy-doc-3.14.3-108.el8_7.2.noarch.rpm c7960959abe31333dbdfc42cf004e54bec43c5b82816d0efe13f3c5dc65c3e16 selinux-policy-minimum-3.14.3-108.el8_7.2.noarch.rpm 59ba05d47369d385080c7601f5a0f110ed043454bc2f8a2442b90f1450e5dccc selinux-policy-mls-3.14.3-108.el8_7.2.noarch.rpm 9644f8b01fa6ff683ab447ce29d6433db26f6516bb67e147a87bc50d603876f4 selinux-policy-sandbox-3.14.3-108.el8_7.2.noarch.rpm 800716bd8afd4b143ad5d2da713ce0c9c27b5775f7ee840ea6e1f27e6264f8f7 selinux-policy-targeted-3.14.3-108.el8_7.2.noarch.rpm edca9f783ee64438467aab41236f4d68bf0cc390c4b6975cdaad10d04b5d5591 RLSA-2023:1569 Moderate: gnutls security and bug fix update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152) rocky-linux-8-x86-64-baseos-rpms gnutls-3.6.16-6.el8_7.x86_64.rpm 5e4ed69fec2da582fb01f7d4ab5f6024ade26cba9af6ddc1b65c8702850520a1 RLBA-2023:1570 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager hostname lookup fails with IPv6 (BZ#2174362) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager hostname lookup fails with IPv6 (BZ#2174362) rocky-linux-8-x86-64-baseos-rpms NetworkManager-1.40.0-6.el8_7.x86_64.rpm 82c3c779d3241fbc7bef8dd6d670a4484eb93939a084365e922971dad6169d8b NetworkManager-adsl-1.40.0-6.el8_7.x86_64.rpm 5b46ac90f769aad6603f50210a7b57e89ca802e8e8bc28852a375fdcafcc02f9 NetworkManager-bluetooth-1.40.0-6.el8_7.x86_64.rpm 727184d6fc4555e0babe5b42b2142073dd729147a0d51ba16755ec6cf73652cb NetworkManager-config-connectivity-redhat-1.40.0-6.el8_7.noarch.rpm 6cbb3a4599412d4f9532c78c37a25a7fc1d13c3db025c56ca81b018ceb4474b8 NetworkManager-config-server-1.40.0-6.el8_7.noarch.rpm c19ab8732408c8519100a185a29a88f6552b6c13f88179999a3478c61a98fa0a NetworkManager-dispatcher-routing-rules-1.40.0-6.el8_7.noarch.rpm f5b804bb2124b9760066f570061afcedb5c51ac16c6fb7d78c8d987a4472d69a NetworkManager-initscripts-updown-1.40.0-6.el8_7.noarch.rpm bd3bb61ec99c1b671a3cd14b349cf56bd38d4951dc63bdc5d5c33b964df64731 NetworkManager-libnm-1.40.0-6.el8_7.x86_64.rpm d0766561c8a07b70b6d8516810a9d7221db09688669bc7743167a202552e5d2b NetworkManager-ovs-1.40.0-6.el8_7.x86_64.rpm bc85b3d875caf318530dcdcdcedaff8f417fe087f2907d3f11ea40ca5c81c3c8 NetworkManager-ppp-1.40.0-6.el8_7.x86_64.rpm 3f0e9224417156c113778f5ec8b98922607ff115a6585c17ca1e9bc082bfbd54 NetworkManager-team-1.40.0-6.el8_7.x86_64.rpm 43d0a26d8f8e7ce97d49fdb52265d82dbeeee6034295f7cacc1227b0d81a8f2b NetworkManager-tui-1.40.0-6.el8_7.x86_64.rpm a13cd9f9a90a3b38859a1bb35fa0778bc8b1b777a0e20fd899a9223cedea8474 NetworkManager-wifi-1.40.0-6.el8_7.x86_64.rpm 8d0d510f9ed82c8af25cc939a9c1c26dfe36fb52657ebae7f983dbf05518ae1e NetworkManager-wwan-1.40.0-6.el8_7.x86_64.rpm 8210252ef33a531c119dacfafe833fe2d1a3398f24a87548618d87fa0a51a8a4 RLBA-2023:1571 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.5.1 (BZ#2175806) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.5.1 (BZ#2175806) rocky-linux-8-x86-64-baseos-rpms sos-4.5.1-3.el8.noarch.rpm 6b7406d995defe6c7158fd2342a79920920c06c94b0ed3670423892afb782297 sos-audit-4.5.1-3.el8.noarch.rpm 43723ff3f321f3847b20a5162268aace1d60dbb7812534ae808add2d3ba93133 RLSA-2023:1930 Important: emacs security update GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms emacs-filesystem-26.1-7.el8_7.1.noarch.rpm e818eac7fc25269dec708905b869d866a00355e16ca5524cacb291d1f6d383f0 RLBA-2023:3103 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably: * The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25. * This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably: * The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25. * This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a. rocky-linux-8-x86-64-baseos-rpms tzdata-2023c-1.el8.noarch.rpm 172d38efe4e48e867246cfc57b33d60043c4b31cd7787e9a2b2567e89753c9d0 RLBA-2023:2953 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kexec-tools-2.0.25-5.el8.x86_64.rpm ff0d34cb1d06749935cbfa3d3adb39f96d177015202c1c0da6a280e60febd51b RLBA-2023:2956 libteam bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libteam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libteam-1.31-4.el8.x86_64.rpm 64f333907f546ff886323153cdc0dd959ce6ebb985f1cd920030be950ae9e54c libteam-doc-1.31-4.el8.x86_64.rpm 3aa1092f416fe39a097978cf89dee19b3704048179ae90bcb7fb2c673a74f821 network-scripts-team-1.31-4.el8.x86_64.rpm 885998bd1c974ce43667925df1d18e7f13a71213d9606ba660810eb8529f83f2 teamd-1.31-4.el8.x86_64.rpm 33fcc14545bd22703123fc1cfd88aa133b40f4d28a7bacc73a7cfa409d8a8220 RLBA-2023:2957 kmod-kvdo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kmod-kvdo-6.2.8.7-88.el8.x86_64.rpm 197c3c5ef31137418aaf63d5ce71b265c4e75285ca0a635f81a52cadace977ae RLBA-2023:2966 tboot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tboot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tboot-1.10.5-2.el8.x86_64.rpm eea21199d9c98020c453d12f3f386919fb953106940bed8498dba3dccb46599d RLBA-2023:2978 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms opencryptoki-3.19.0-2.el8.x86_64.rpm c65d3f6ad175cc50e19966e6e5b2fa24eea85156fbafd565c80bed8d6e63e564 opencryptoki-icsftok-3.19.0-2.el8.x86_64.rpm 817c1e72eb9dc3e33fc2ecb085e4feaa888473bb6f3fb8db9c0c3620d532dbdf opencryptoki-libs-3.19.0-2.el8.x86_64.rpm b8d4dbc6ac59f32f9b8f1f56c1a40409aa5aeb1270102caf8528fa3c2084e6a8 opencryptoki-swtok-3.19.0-2.el8.x86_64.rpm d01970d3b73208993142d4560cbcf0a23cbfd150736f191685700366f1682c41 opencryptoki-tpmtok-3.19.0-2.el8.x86_64.rpm 4109780b43ec7dd122305563b21835e0764e249e8a46234a45ed806f1e5665c5 RLBA-2023:2979 libdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libdnf-0.63.0-14.el8_8.x86_64.rpm fb0348039a81e4052b2e688472f60060e1a932f7b155e811d2bd0641606f79c4 python3-hawkey-0.63.0-14.el8_8.x86_64.rpm eb382fddc65c6f263ee4237d6daaa8848ef6ef054d64b85ad3f95a0a212a6680 python3-libdnf-0.63.0-14.el8_8.x86_64.rpm b4a834bd1e7a60d46f4d0fcc86af98e6c4d6465db9755b8cd1c6bd5473fa4d40 RLBA-2023:2984 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dnf-plugin-subscription-manager-1.28.36-2.el8.x86_64.rpm 5a4e1612c5401c9ef0820c807c695075ba8237946b6a62d6e9027ed7b723c5a4 python3-cloud-what-1.28.36-2.el8.x86_64.rpm bf355bc70c3bfaabea69624c326d0ae83668988ef48a952e9043c6cbe5bc6b3d python3-subscription-manager-rhsm-1.28.36-2.el8.x86_64.rpm 984161b00205948430c3605ac03b1d350c0734e0636b1ba0f9eb0ec2a0661978 python3-syspurpose-1.28.36-2.el8.x86_64.rpm 9cfa1c641e310f35225653f570dcffcfad7b1f1eb735ffaf711f92cf7164f00d rhsm-icons-1.28.36-2.el8.noarch.rpm cd7db5da1b82708148a5720eed115437564328817ef9c61cb33c4c140f70da1f subscription-manager-1.28.36-2.el8.x86_64.rpm 69d337f9765c73e4e5609fe8f8aaa4d037c8a483b6da474784cfc2b560ae57a8 subscription-manager-cockpit-1.28.36-2.el8.noarch.rpm d82b6f2e75b756e034caacd882e52fc8378568e89b82a82a60c11ef9ed8af904 subscription-manager-plugin-ostree-1.28.36-2.el8.x86_64.rpm 19ad9b4556224d165aada066b719f222a6a0653651323f969f3b7902d2126fd7 subscription-manager-rhsm-certificates-1.28.36-2.el8.x86_64.rpm 51e7a83b5774db248a1c53afcd66bb17f9a4873ebdbeccc0169a966b52cd3951 RLBA-2023:2991 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtalloc-2.3.4-1.el8.x86_64.rpm 5a76e05740878a475b22069e56e0cd5658273f415a8dcf22137ab97c1ef5e471 libtalloc-devel-2.3.4-1.el8.x86_64.rpm b489ed308b647b8272adf23bfd268178da065768c979677910a7bbc2b3d9b9be python3-talloc-2.3.4-1.el8.x86_64.rpm d4974b83af1da8f7b4511271242b170bfda42e7d58b08cc7f8d15114341f11bb RLBA-2023:2996 cryptsetup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cryptsetup-2.3.7-5.el8.x86_64.rpm 48ff177cf87a4bc384963f3db9f9308ae97c2113ab36b15ffa07918135daba48 cryptsetup-libs-2.3.7-5.el8.x86_64.rpm 727a71268220f90692b99060b244d15a32906eb71c02c0b7121e10e51a03088a cryptsetup-reencrypt-2.3.7-5.el8.x86_64.rpm 78f6928db7a58643dfff852bd5c1fd8d596193b4f535e3b6b3c1af42f0d3374d integritysetup-2.3.7-5.el8.x86_64.rpm 87288f867b5afb9608693460ff26886a957e9f0e12f8a5567fe81ae3606a0e58 veritysetup-2.3.7-5.el8.x86_64.rpm a0dc83c3b451a0e84951abaff1a2d681bb01153b6ea69e66478ec67b8ec6a56b RLBA-2023:2997 adcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms adcli-0.9.2-1.el8.x86_64.rpm 8fa9afb4c9365b4695f4a112fd15e842549fcd79dc60af517dcc948a8faa0ad1 adcli-doc-0.9.2-1.el8.noarch.rpm 15217133c085f89b79dc4b20a9e14b0e0b0f0f1884f3aef111327d47fa8df53e RLBA-2023:3007 libtraceevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtraceevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtraceevent-1.5.3-1.el8.x86_64.rpm 1e70b0b15e9be88354705f0462b8422a020978bacc3e36d72e2f02aafcb76d65 RLBA-2023:3010 libtracefs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtracefs-1.3.1-2.el8.x86_64.rpm eda6968b4b591db0a3aedc9555073cc1c1b4fa496fbe92ab465c604e73a4166a RLBA-2023:3016 tar bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tar-1.30-9.el8.x86_64.rpm 55e2cb6a1e29746ae59fcd1138bcbfcd372362e5cae0c3483ce643711a7a7707 RLBA-2023:3036 librhsm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms librhsm-0.0.3-5.el8.x86_64.rpm b3eaa310cf4d75e640dc31ebd7083777f9d17cc162bb8763f6032a3691855eb8 RLBA-2023:3043 perl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-Errno-1.28-422.el8.x86_64.rpm 46bf5e2b26133ae96a22feaf62d5993f3a7054f03090cd8348ba4bd4eab8380c perl-interpreter-5.26.3-422.el8.x86_64.rpm 65d93d0fb4f022a6882da3632b83a6eae700d54a236d819669b1b998f6adb6dc perl-IO-1.38-422.el8.x86_64.rpm baf711875b0dbabd8eb852cd28928c452d220f3976bd61853c3a77e8d66ff62d perl-IO-Zlib-1.10-422.el8.noarch.rpm 0d3e1c768da883fe6c7f9c2b889eb0f6b2d0618d3897dac5e9db54cac1b396c0 perl-libs-5.26.3-422.el8.x86_64.rpm 724c620ac247ade5056b4d0d22b1617140bac8cac9fcfdfefdd6a70791191b0d perl-macros-5.26.3-422.el8.x86_64.rpm 2d9267fa70dbfd0c7104d4897cd35c07d4fd33bd224dcace515209dc2e49fa52 perl-Math-Complex-1.59-422.el8.noarch.rpm 39ea34de65b999e9d930e330d681f41de8e33867cc8b21f81ecd8c3a2983c40a RLBA-2023:3048 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms device-mapper-1.02.181-9.el8.x86_64.rpm 11e5cd7404833170c8573d516ea0171bea9f18151939c2d2705e1126bea1208c device-mapper-event-1.02.181-9.el8.x86_64.rpm e2b5eba79c16bfa99fa725c014ab7b5a2855fed8330306a0fb3e30e334cfff6f device-mapper-event-libs-1.02.181-9.el8.x86_64.rpm ef19aa1980349b3dff9ec3ec441d6410622219093d3a24fd49d882433bf995f5 device-mapper-libs-1.02.181-9.el8.x86_64.rpm 868ade12b74be5a492450f1a8f0b1438a4de5663045eee9c9e122dd5df0a3c92 lvm2-2.03.14-9.el8.x86_64.rpm 8af03a650690a6ba53887e1945d87ebe5b63dafa3893396410b2807a48051ebc lvm2-dbusd-2.03.14-9.el8.noarch.rpm 9009cba46706d0f596478343943c8c4d13896b61ccb641a836658735f8d51277 lvm2-libs-2.03.14-9.el8.x86_64.rpm dc7216c4f307233236ad5cfcf7f6e99854d8b894814eeaeaf0e5d8474ab93982 lvm2-lockd-2.03.14-9.el8.x86_64.rpm cdc638e5ea27106ce1e3dc1a123387ffc64f43fda95fb64c2cf24ffdb3becc3d RLBA-2023:3060 opa-ff bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opa-ff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms opa-address-resolution-10.11.1.3.1-1.el8.x86_64.rpm 05f3293d8e913e1d65d92617b1a98b3baec19dc72db4d247bb12b23e04d86aec opa-basic-tools-10.11.1.3.1-1.el8.x86_64.rpm 2b65d40d5a27432c8cbb67e05827b1580b6cf4fde4fd5457ff6c0cdc6a59f9db opa-fastfabric-10.11.1.3.1-1.el8.x86_64.rpm 72f4c536e7e8d602a8a135380060fab1aae1f7c8a7d58e2b99ef39b00a557ef0 opa-libopamgt-10.11.1.3.1-1.el8.x86_64.rpm dd726541bdfe6083f81f44420a09ce75833765e7d76a9a770f88e990c9d183ed RLBA-2023:3063 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms file-5.33-24.el8.x86_64.rpm 07e9e94435e1226ff099a260124525a6f36daaf6d8f33c8cc5803b83755f3c5e file-libs-5.33-24.el8.x86_64.rpm 1ca5c1c361c443e560e29c436e1ccf3d8a0adb870102156b5d538d18fadc24b2 python3-magic-5.33-24.el8.noarch.rpm e1561599f12135b7b36a64fe32ccea7c919aaf5ec469b42f42a6acfee796673d RLBA-2023:3064 python-dmidecode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-dmidecode-3.12.3-2.el8.x86_64.rpm dc57ae4b97be2dac9b4c4e1fb87ffe3470d3591ead288f883ea34e994db9d0a8 RLBA-2023:3066 mcelog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mcelog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mcelog-189-0.el8.x86_64.rpm 6896e93cc63ef2a0326cc753bea02b962298cfedf11f8d1d769eb897d2312edb RLBA-2023:3102 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Backport hint about systemd daemon-reload. (BZ#2180442) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Backport hint about systemd daemon-reload. (BZ#2180442) rocky-linux-8-x86-64-baseos-rpms libblkid-2.32.1-42.el8_8.x86_64.rpm 6466a92b77ef0cec7ccb122de0d172bd4d2993df5d6dfcd1b917b97d2cf5b03c libblkid-devel-2.32.1-42.el8_8.x86_64.rpm 6ff60e7036e6c18b03df263fc32475122bfdd90c8b539cdee024d14089505839 libfdisk-2.32.1-42.el8_8.x86_64.rpm 85d52e13ec46bf12854732d25ff172a490426ba7775d4ede89b1961ac3ab08aa libfdisk-devel-2.32.1-42.el8_8.x86_64.rpm 5c54d72aac0b7ffec31827af808e40db7e33e1c81c1d8923c6ad15ae379d09fb libmount-2.32.1-42.el8_8.x86_64.rpm a342297a82824e38c8c99738fac77a6c1f6606620998c7758689680497c246c7 libsmartcols-2.32.1-42.el8_8.x86_64.rpm 01c742e55f7e8dc55dc6b6841912046327dd742025d9ee055b0c829435b9e5c8 libsmartcols-devel-2.32.1-42.el8_8.x86_64.rpm 98874102c383c79d0bff5ea0c5050e9b3e2fd1d6199d9161de50094b543a6822 libuuid-2.32.1-42.el8_8.x86_64.rpm 9b9783cd011bc75e083378897f906a6d1310afa2487ebd22f05c1a5ce4cdd99d libuuid-devel-2.32.1-42.el8_8.x86_64.rpm bf5f3184a6875ec0c666fea2f30bb04d8c8ac595abc6800232a97c40123fd085 util-linux-2.32.1-42.el8_8.x86_64.rpm 846287e4f0b071cdf1d7ea79300ed5a129e2046b1ed78ce9d0c3331e8838b166 util-linux-user-2.32.1-42.el8_8.x86_64.rpm 6be8ddfa7592c194399ac6767aa53babd790f65ac1c1b9f583040c8a6196883a uuidd-2.32.1-42.el8_8.x86_64.rpm 59ec3ad02024f82775f0d74966afef43ac551989375389b9f2ae6808272f5b4b RLSA-2023:3106 Moderate: curl security and bug fix update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: FTP too eager connection reuse (CVE-2023-27535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: FTP too eager connection reuse (CVE-2023-27535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029) rocky-linux-8-x86-64-baseos-rpms curl-7.61.1-30.el8_8.2.x86_64.rpm acc48a589455977d27eed5c9bdfc121d79e281566bb8b830fcd04055e801fdc6 libcurl-7.61.1-30.el8_8.2.x86_64.rpm 60631ad8be454c5cdc9951a25ffc23c4ddbb7abfadb1743e42bebc4f1a2746c3 libcurl-devel-7.61.1-30.el8_8.2.x86_64.rpm ebd163d53585a97281389ea65fe1adb6f03c1f9d86b7c55bb4466483191826c9 libcurl-minimal-7.61.1-30.el8_8.2.x86_64.rpm 479730498fefe7003900ae47f44ade768b97ab46c0acfaefc3349db7022aa1ca RLBA-2023:3414 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684) * [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254) * [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602) * [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272) * sos subscription_manager plugin may collect proxy passwords (BZ#2177282) * [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062) * sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859) * [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176) * Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684) * [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254) * [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602) * [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272) * sos subscription_manager plugin may collect proxy passwords (BZ#2177282) * [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062) * sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859) * [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176) * Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984) rocky-linux-8-x86-64-baseos-rpms sos-4.5.3-1.el8.noarch.rpm 7f0a8ece1f9aef2b5284bb694100b677b74d6fa26017d106cc1d6d5e66be5b3f sos-audit-4.5.3-1.el8.noarch.rpm 775fe1c26d95e93cb646eb46b0f9b89b9322f55e1be3e39a360e9d816165248f RLSA-2023:3584 Important: c-ares security update The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms c-ares-1.13.0-6.el8_8.2.x86_64.rpm 234a646e09c0d5ed88fcc961ecd0c16d8629310e4dd8faf726ba2ab8e9a696cf c-ares-devel-1.13.0-6.el8_8.2.x86_64.rpm 664c60afd63cb17dce9fb651a024afb7bf0696a0e7e36d3983f87e2ac4205586 RLSA-2023:3591 Important: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm 7cef4e886c0a8034c2063b1e1ed8b1302164ae22b23b3d7a2c7ef50cea8904a4 python3-libs-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm 5ed2aa94bda97267c4aab0244dbdc08116625d29ff262dd171f850801fb77b43 python3-test-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm 6a357f80622a93af11df32fdb2a21bfb9e978705cebe6ad29a74820922f1faec RLEA-2023:3843 microcode_ctl bug fix and enhancement update The microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, and CVE-2022-38090. (BZ#2171233, BZ#2171258) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microcode_ctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, and CVE-2022-38090. (BZ#2171233, BZ#2171258) rocky-linux-8-x86-64-baseos-rpms microcode_ctl-20220809-2.20230214.1.el8_8.x86_64.rpm b7321f00c2334aa8d946906ba153fe1335c5db02e813ae5e034ecc588d25be22 RLBA-2023:3845 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * NetworkManager brings down connection when the IPv6 link-local address is removed (BZ#2209355) * ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * NetworkManager brings down connection when the IPv6 link-local address is removed (BZ#2209355) * ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975) rocky-linux-8-x86-64-baseos-rpms NetworkManager-1.40.16-3.el8_8.x86_64.rpm 3c3387a026b5cefa5f308c00c3d4c10228123feceb3d1764d34f599e489dc8e1 NetworkManager-adsl-1.40.16-3.el8_8.x86_64.rpm cd3c4a6b4203f3799c4af50991051f7f04a05b5f934454c63a27a666bb7b26aa NetworkManager-bluetooth-1.40.16-3.el8_8.x86_64.rpm 13f1c87db578364f28fa3df071bb7e4320ad3a39b5649cbf7a0d81fa6551e7cd NetworkManager-config-connectivity-redhat-1.40.16-3.el8_8.noarch.rpm f555a68b7f7a51585c2e2292d108862b31b85209d3668c0e9c1678007cb79e34 NetworkManager-config-server-1.40.16-3.el8_8.noarch.rpm eb4c373898ee5ffaffb55512fa494558d19a0dcfd937431cdb402178a6bf9fd8 NetworkManager-dispatcher-routing-rules-1.40.16-3.el8_8.noarch.rpm 157c9fa8363f772c6097d63fa65cc10ed18314dd5f2315835acc256916fece26 NetworkManager-initscripts-updown-1.40.16-3.el8_8.noarch.rpm 7e6e14dc80f29ab22894c3f854fedd4973546c1713d98c6897b25b7d728f50fa NetworkManager-libnm-1.40.16-3.el8_8.x86_64.rpm 93180594fc3bb3b9feabcf0868e3280913e6d892beab0da515697025441508d1 NetworkManager-ovs-1.40.16-3.el8_8.x86_64.rpm aaf8acaf3476f548cfe9c19a34849a5f03eda60915d728a1d7665e876e63626c NetworkManager-ppp-1.40.16-3.el8_8.x86_64.rpm 0f59747a4bbf59173431620ccb858f731a0449e6b73017048ad609d3d01b632d NetworkManager-team-1.40.16-3.el8_8.x86_64.rpm 42eb2e62e209453022acf5a29a7f1a4af074b15218882718e9abfe2f10e64f81 NetworkManager-tui-1.40.16-3.el8_8.x86_64.rpm 3f2681ab79e4911cace0b71ddc5b37dd2c08dcb1b22cca7298c9a0935dcc01f2 NetworkManager-wifi-1.40.16-3.el8_8.x86_64.rpm f4efaca57de9b22d34a82dcf802576aa4977345693fa63c8476ec2cef97e95af NetworkManager-wwan-1.40.16-3.el8_8.x86_64.rpm 93f9f541352232ff80455168876a2c1f8df4024d50c449bb74b888ddd4686a80 RLBA-2023:3846 selinux-policy bug fix update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * systemd-pstore fails to start due to avc denial (BZ#2188268) * Relabeling of /run/fsck (BZ#2212328) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * systemd-pstore fails to start due to avc denial (BZ#2188268) * Relabeling of /run/fsck (BZ#2212328) rocky-linux-8-x86-64-baseos-rpms selinux-policy-3.14.3-117.el8_8.2.noarch.rpm 7f6ad0f813879d1a51baaef4745c48cd432c147db3b72dcee814cb671635f3a3 selinux-policy-devel-3.14.3-117.el8_8.2.noarch.rpm dd9e5f89926683ec01278f6f61f08ceadfd5041833c4220e1c7b265619515e20 selinux-policy-doc-3.14.3-117.el8_8.2.noarch.rpm 26d11647b989995b16ece5dedc1b58881c25019c88b1b48e895dc0f9c4d84451 selinux-policy-minimum-3.14.3-117.el8_8.2.noarch.rpm 42709415e373b719dd05d16041fd82b5dc5e90c9d8243e742b4bfeef9f76685a selinux-policy-mls-3.14.3-117.el8_8.2.noarch.rpm 6762f3e25f7f9474012da46063831e81b81fcf1c0d9cc6e36b0845c7f79b3032 selinux-policy-sandbox-3.14.3-117.el8_8.2.noarch.rpm cc9920876bf370315c6b7646f5c547d6b2bf53a4bb3242550bd30b02199fe540 selinux-policy-targeted-3.14.3-117.el8_8.2.noarch.rpm 609cffecdf4eb34c9f6fbf929c027afa97b9af645d911a1c60335c1a412bcf70 RLSA-2023:3839 Moderate: libssh security update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667) * libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667) * libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libssh-0.9.6-10.el8_8.x86_64.rpm 32e82d5635e5334428b3aecec431cffc9bbca157e076d50b7fe74a4f62b0ae30 libssh-config-0.9.6-10.el8_8.noarch.rpm 3e5d27decdf556d137d933343df069c27646eddc24424daf0a955d734d0a9087 RLSA-2023:4102 Important: bind security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms bind-export-devel-9.11.36-8.el8_8.1.x86_64.rpm 6dad0c90d1cf3714e0db79138ca352e04f4c14035680e20f2b7f4481ca83f727 bind-export-libs-9.11.36-8.el8_8.1.x86_64.rpm 407b106e5ceada938404e6aa0ef039de0e7b3eba1462d760b552270fada49a21 RLBA-2023:4279 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * sos report collects data from container instead of host due to symlinks    Triaged (BZ#2075720) * sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562) * RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951) * Exception raised by hpssm plugin in plug.setup(). (BZ#2216608) * rebase sos to 4.5.5 in rhel8.8 and 9.2 (BZ#2217943) * sos clean - Respect permissions of sanitised files (BZ#2218279) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * sos report collects data from container instead of host due to symlinks    Triaged (BZ#2075720) * sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562) * RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951) * Exception raised by hpssm plugin in plug.setup(). (BZ#2216608) * rebase sos to 4.5.5 in rhel8.8 and 9.2 (BZ#2217943) * sos clean - Respect permissions of sanitised files (BZ#2218279) rocky-linux-8-x86-64-baseos-rpms sos-4.5.5-2.el8.noarch.rpm 5cd5a9aef2b3a62a5e1a27c419b5113af2b62c3f8323aa8875eedad8343727a0 sos-audit-4.5.5-2.el8.noarch.rpm d0f18c4d5e5b388aac649b277d7313885af6bbdc61b5ae7d62c3c56d2f487e98 RLSA-2023:4419 Important: openssh security update OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms openssh-8.0p1-19.el8_8.x86_64.rpm 2c58374f216094e48f1bbdc133da6aa319be6b7167716a73c31c3da4bc9be8e0 openssh-cavs-8.0p1-19.el8_8.x86_64.rpm b5aa8acc3e3ce9e4daffb80915c2952fd4e18e4ce216c1f2be7a161afd2d0845 openssh-clients-8.0p1-19.el8_8.x86_64.rpm 90251af532a5d669ade3fcbf7ff056f973d875eadcb72f09dd5872992f0217ba openssh-keycat-8.0p1-19.el8_8.x86_64.rpm 5c41c4fbecacedf7f6de31200ec18377dcabd3d2cb46155a97b3ed556e4fad52 openssh-ldap-8.0p1-19.el8_8.x86_64.rpm f70ca5500dd837422161084a4079e7b7a56a5f9f388b5d978b2e07a7b3b02139 openssh-server-8.0p1-19.el8_8.x86_64.rpm 1bc8eedaa97f533b2d1d111880ef0ad0b5f781690221f139e7307f3f3bc1ea0b pam_ssh_agent_auth-0.10.3-7.19.el8_8.x86_64.rpm 8f8317833a6587acd89d4eb33a02787a7d3761edcd875845e2dc9771937fd3f7 RLSA-2023:4498 Moderate: dbus security update D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms dbus-1.12.8-24.el8_8.1.x86_64.rpm 38407d4952fe8ad950c9bbae15503e654cd70db8541ad363a4863d32a520aafb dbus-common-1.12.8-24.el8_8.1.noarch.rpm 51ab0fbbd3337ca006d0b4febe7f4b916195538845c87a8bbf1dddd9f9962f9c dbus-daemon-1.12.8-24.el8_8.1.x86_64.rpm 6b34fb72c2040d12c830919b778b55632d6dd89920fb679840bb8b97cfedc9e3 dbus-libs-1.12.8-24.el8_8.1.x86_64.rpm 8922139e41914d3e70f3d16ca1014ea5c0c0da1e8e56f8a86cc2e539578f46cc dbus-tools-1.12.8-24.el8_8.1.x86_64.rpm 6fc0218d86028b406b33a80335167b034369fb21d97127e8a747435e77b282f7 RLSA-2023:4524 Moderate: libcap security update Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Security Fix(es): * libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603) * libcap: Memory Leak on pthread_create() Error (CVE-2023-2602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Security Fix(es): * libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603) * libcap: Memory Leak on pthread_create() Error (CVE-2023-2602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libcap-2.48-5.el8_8.x86_64.rpm 03346a85df04d758f3ac53715fc17ff5c1c448f8c9261b25b6de50c4c1d40a90 libcap-devel-2.48-5.el8_8.x86_64.rpm 0fa9ad15ae590cbb87a701154206a6c033f68595f79ffb9b6ce10162d199f1f9 RLSA-2023:4520 Moderate: python-requests security update The python-requests package contains a library designed to make HTTP requests easy for developers. Security Fix(es): * python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-requests package contains a library designed to make HTTP requests easy for developers. Security Fix(es): * python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms python3-requests-2.20.0-3.el8_8.noarch.rpm b9245956faa62d6e4dd443679dd3aefd437c2510a3558a4a8772e50c6b5abeb0 RLSA-2023:4706 Important: subscription-manager security update The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Security Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Security Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms dnf-plugin-subscription-manager-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm 5ce9406a1a2a01c737fc3c758a62afb9907d5ddff6586bd761457ffd3007902d python3-cloud-what-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm 368136a4320e82eed9faf7523627fde7d50169876d4b22d24f27cb7950f41a9d python3-subscription-manager-rhsm-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm 35d4c9375dcd2c5019ea89b60b6e19fd97e074f607e44687182f80b5ea8cce7b python3-syspurpose-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm 7c2168df6cc6c20a530f181e57ec820e64871e065afd6ff52bb5c77e1b7dc11d rhsm-icons-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 7424b2d3e9d10f0a1c2c18bfe80b60f635d4dc924a8ac942a67f0574e041692f subscription-manager-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm 7df41f6733196406fdffe000de2f286d74254b0c9282a9ef6bcf3807f04856d9 subscription-manager-cockpit-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 6c04f3fc34a4cc4a8ad23a5ec1f19f496cd4974266d4540e1e17d520f77457e2 subscription-manager-plugin-ostree-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm c91841fc3658813f9e60923051d75dc125f42606b8ef4750541e5da37d388d41 subscription-manager-rhsm-certificates-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm 2fc6611d6fef46747eb6550403477c9bbdb842e45b7a922fc2b1caabf032e4a9 RLSA-2023:3837 Moderate: systemd security and bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: privilege escalation via the less pager (CVE-2023-26604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: privilege escalation via the less pager (CVE-2023-26604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153) rocky-linux-8-x86-64-baseos-rpms systemd-239-74.el8_8.2.x86_64.rpm f5c0c0bb29c22dd20464c1a0a82281b8a527049451c622dea7bfd5178385ab44 systemd-container-239-74.el8_8.2.x86_64.rpm ce9ae4c06744939d95a82cfd9aa11e3f06b34b395077ab8f33db586abf60f9d4 systemd-devel-239-74.el8_8.2.x86_64.rpm 9d9df9dba19c3b54d01cfa3e8af2f85b085c4adbdbb10cff86e1a309b10aef3a systemd-journal-remote-239-74.el8_8.2.x86_64.rpm 11988db91850a7327f3594c9015803fd5d43dbf9e589a14159126aeb49a772de systemd-libs-239-74.el8_8.2.x86_64.rpm a2404adcb2093e95175347d6dba5adb9dc3f238d59b05bc2446808c3a81d2990 systemd-pam-239-74.el8_8.2.x86_64.rpm b9de5be50e984974c931af5e5573acb9362ed6cc03eb9ef54d18217728fb0281 systemd-tests-239-74.el8_8.2.x86_64.rpm 4274fbfefcc4a02924abdd8563d7f8a89e143f41d3e3a069d785765c6894a9d1 systemd-udev-239-74.el8_8.2.x86_64.rpm 1d178c05c674ef26b989acb60351e17209cd6268f9b971889900ee2d14419c7f RLSA-2023:3840 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Crash due to misuse of window functions. (CVE-2020-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Crash due to misuse of window functions. (CVE-2020-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms sqlite-3.26.0-18.el8_8.x86_64.rpm 4d18fd348ad2f74837b4a374944be867bfcec5032712a1f6e19bc452c011b5c5 sqlite-devel-3.26.0-18.el8_8.x86_64.rpm 65f8be498216141278088dc39b92bdc6bb6d2aaff11c213e56fb3689ff7a62ec sqlite-doc-3.26.0-18.el8_8.noarch.rpm 37bf72b866e31176a58ad1187061e3ce2ade2a2829677ca7d15a2ee3f5b7d4de sqlite-libs-3.26.0-18.el8_8.x86_64.rpm c7e863ac7809aca4a4333168ce561a35f1fd0af67814a30b1f34e5bed2cd786b RLBA-2023:3841 kexec-tools bug fix update The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's firmware dump tool when 5-level paging is enabled (BZ#2189377) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's firmware dump tool when 5-level paging is enabled (BZ#2189377) rocky-linux-8-x86-64-baseos-rpms kexec-tools-2.0.25-5.el8_8.1.x86_64.rpm a9143d1ec54df01b7403a0868f283447b519694c789616d92cafc2274494c718 RLBA-2023:3844 xfsprogs bug fix update The xfsprogs packages contain a set of utilities to administer the XFS file system, including the mkfs.xfs utility to construct an XFS file system. Bug Fix(es): * xfsprogs: ignore autofs mount table entries (BZ#2208391) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsprogs packages contain a set of utilities to administer the XFS file system, including the mkfs.xfs utility to construct an XFS file system. Bug Fix(es): * xfsprogs: ignore autofs mount table entries (BZ#2208391) rocky-linux-8-x86-64-baseos-rpms xfsprogs-5.0.0-11.el8_8.x86_64.rpm c7b665830ac3b6dda773a184d3e50a6ff7ef653ec7e8e0374e4aa7b62197401f xfsprogs-devel-5.0.0-11.el8_8.x86_64.rpm fa8169513174f354ea5363aabf835bd081a591b11aab7f6b9d931887c609f89c RLSA-2023:3847 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092) * HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305) * kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595) * block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236) * xfs: deadlock in xfs_btree_split_worker (BZ#2196390) * Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214) * mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284) Enhancement(s): * Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092) * HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305) * kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595) * block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236) * xfs: deadlock in xfs_btree_split_worker (BZ#2196390) * Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214) * mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284) Enhancement(s): * Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604) rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-477.15.1.el8_8.x86_64.rpm 31f0bab3bc56411a29d2c29406f77d56bbe45da5aab525cc37e392b54b18661d kernel-4.18.0-477.15.1.el8_8.x86_64.rpm f65cbf162d9da3705e0c1fc153a9f9ce9b2f18eb16e8df810addf0caf7d084ed kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm 4b57da1f93ac79480252481b3447f34b1ff62e9d62d2a0c2d11b691fdd871ed1 kernel-core-4.18.0-477.15.1.el8_8.x86_64.rpm 4bd3872fa3e92f0c061e42c0555e33c42fe058625cde325a4c6920e31af33f3b kernel-cross-headers-4.18.0-477.15.1.el8_8.x86_64.rpm 7f7a03e72e88a2080da54f26014a387cd0fba7066342a32c892fb96a43267817 kernel-debug-4.18.0-477.15.1.el8_8.x86_64.rpm b6f107e61eab93ced3b569e83da69a5b661e380849d7467c5792ae9b653557f8 kernel-debug-core-4.18.0-477.15.1.el8_8.x86_64.rpm 2d1ed30002c7a7375e409c3f0c2a5d1ea705e53c9247d2cd0a3c091738030567 kernel-debug-devel-4.18.0-477.15.1.el8_8.x86_64.rpm d14f0db6c35d5390266bccd7b85d4aac8669718962f1446c43c4421a8282fcf0 kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64.rpm bcfd7f5177e05136b91eb411f922e7ce7233774647561ce138aa7abcc4f07586 kernel-debug-modules-4.18.0-477.15.1.el8_8.x86_64.rpm 857dac18b8fb83df9a79a4e2df40747a4794c59f5cac48fce4dcbe206147fe77 kernel-debug-modules-extra-4.18.0-477.15.1.el8_8.x86_64.rpm ad39cfb35b841bf8e99cc09348632b6446cba9bafc32b19557c178539b81601d kernel-devel-4.18.0-477.15.1.el8_8.x86_64.rpm 93ac0fcd613a08cfa60944ce68b29446d72ed221b1963fde10a1804a35d83921 kernel-doc-4.18.0-477.15.1.el8_8.noarch.rpm 043697866fe6d669b7208572774446c3534f6783578414487bf872ee7ecb10bd kernel-headers-4.18.0-477.15.1.el8_8.x86_64.rpm 1d11184442c5e39e462eefd22528ff73e9a35f5f7b7dd6c768147c3b9f19f216 kernel-modules-4.18.0-477.15.1.el8_8.x86_64.rpm 9ec60a5e0b22b35ef6630aec0e9dcaee0ff0dcb5ff9c67758e48bf37c54e6631 kernel-modules-extra-4.18.0-477.15.1.el8_8.x86_64.rpm 0418bd721377d0cc73956ee0a35ded8912b08ce2f0618f064840ff3debf5d8b5 kernel-tools-4.18.0-477.15.1.el8_8.x86_64.rpm 381be8353d2f9cf60bae9c45ba94d8fa78bc87557286c645177cd5e072e4b965 kernel-tools-libs-4.18.0-477.15.1.el8_8.x86_64.rpm 8acd0b35d1101bb1c65e7b3b2a1ac0ba28629d1f1bd83720e948421b11c1522a perf-4.18.0-477.15.1.el8_8.x86_64.rpm 9529f411f361c081e264b0b58f01488e8390dc77e9dba18eddd710ef056240cb python3-perf-4.18.0-477.15.1.el8_8.x86_64.rpm 38928b9b3fa33b1ea0add71a9dd05d25c8398653df5a9cbd7784c9d8bf5e4f52 RLBA-2023:3848 autofs bug fix update The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * autofs fails to start with combination of +auto.master and local direct map lookups after upgrading to 5.1.4-93.el8 (BZ#2212588) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * autofs fails to start with combination of +auto.master and local direct map lookups after upgrading to 5.1.4-93.el8 (BZ#2212588) rocky-linux-8-x86-64-baseos-rpms autofs-5.1.4-102.el8_8.2.x86_64.rpm a2b81c1c0ede5325f5bd6846335659938493b8a6c71ff5799d664ffbabdc2456 RLEA-2023:3849 iproute bug fix update The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es): * macvlan: Add bclim parameter (BZ#2209687) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es): * macvlan: Add bclim parameter (BZ#2209687) rocky-linux-8-x86-64-baseos-rpms iproute-5.18.0-1.1.el8_8.x86_64.rpm 9f857d270bc15d9081991e4b2b05aa90536212d1e722a4412fe84ca393697c76 iproute-tc-5.18.0-1.1.el8_8.x86_64.rpm 8708f0a4803cd55b0bf5545d3011bcca84b841006fc02774d2adb0231eeec5c8 RLEA-2023:3850 krb5 bug fix update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390) rocky-linux-8-x86-64-baseos-rpms krb5-devel-1.18.2-25.el8_8.x86_64.rpm b593c9ff18319e6bfa529dab8cacd18adf570af83a7b9d1b84f30bed7f201b37 krb5-libs-1.18.2-25.el8_8.x86_64.rpm da59dccea54a76ec61593956a17270d6167157e13853571475b78ecc55b797dd krb5-pkinit-1.18.2-25.el8_8.x86_64.rpm 47b1726fd7869fe2ef0f8c68d796411484edb306137884d2a59bc8556fbe9516 krb5-server-1.18.2-25.el8_8.x86_64.rpm 677c6f39dae4dfc0feca4d46326ecdc1104f782f1f8330dfbb9fcd8bf4f1cbf6 krb5-server-ldap-1.18.2-25.el8_8.x86_64.rpm 00ebd45b1a2223546ba8b3af006a80e1e4f8ac4bb7eae925d3add5446c78c202 krb5-workstation-1.18.2-25.el8_8.x86_64.rpm e2ab12b140fb394d6e89895e4d86404bff9955ad884a1c4731597c458f3a7a4c libkadm5-1.18.2-25.el8_8.x86_64.rpm 04038f0aec588ba6ea7b0f458699aa8bac736d31ebd6978342421a1d50c579c7 RLSA-2023:4864 Important: cups security update The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms cups-libs-2.2.6-51.el8_8.1.x86_64.rpm 5543d528c6c9a2b3593455fa400bb95e88980a71e271460f157d4612a0dac927 RLBA-2023:4880 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563) * Add ovn-ic related changes for OCP 4.14. (BZ#2226682) * [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563) * Add ovn-ic related changes for OCP 4.14. (BZ#2226682) * [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724) rocky-linux-8-x86-64-baseos-rpms sos-4.5.6-1.el8.noarch.rpm f47f98ca59d2b49077d1894cd6e92df557dbfc2edcd8d3f66dddfc8652e7f0f7 sos-audit-4.5.6-1.el8.noarch.rpm 56078dba10109b53639db2f7da13d8fdb2ef539f9b609f1ee496b714ffeb2987 RLEA-2023:4995 microcode_ctl bug fix and enhancement update The microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2229733) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microcode_ctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2229733) rocky-linux-8-x86-64-baseos-rpms microcode_ctl-20220809-2.20230808.2.el8_8.x86_64.rpm 654d83a81df8bb19c4272895188b860a23551bb0fbc5f5828d672ffab68ddbaf RLBA-2023:5354 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Adding Huawei UltraPath commands to sos package (BZ#2187407) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873) * Discovery plugin no longer captures data. (BZ#2222134) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Adding Huawei UltraPath commands to sos package (BZ#2187407) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873) * Discovery plugin no longer captures data. (BZ#2222134) rocky-linux-8-x86-64-baseos-rpms sos-4.6.0-2.el8.noarch.rpm 9217d56c722350a4c2fcf26c9ddeec2a08b2bef49c2c5263bc7c0970508bae9f sos-audit-4.6.0-2.el8.noarch.rpm 67423124c974cf93feee2d9371a89ecfd17ca923daecb0889b9d6b297dfc4c4c RLSA-2023:5455 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911) * glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) * glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806) * glibc: potential use-after-free in gaih_inet() (CVE-2023-4813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911) * glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) * glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806) * glibc: potential use-after-free in gaih_inet() (CVE-2023-4813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms glibc-2.28-225.el8_8.6.x86_64.rpm a96bcc58d06d8d334a76c319f13838fef91076fa67f6604a14b4efa262e053ad glibc-all-langpacks-2.28-225.el8_8.6.x86_64.rpm f336846f49001b0f0edfd220019bde0e0b311eed177fd9d2d9991b1372101604 glibc-common-2.28-225.el8_8.6.x86_64.rpm eb85418d717b3bbab49967a29ea6db2b92295825343e37cb27e0b41cf4f95177 glibc-devel-2.28-225.el8_8.6.x86_64.rpm 85257bd86b8947ac1f81844580dce18f6edea550815c1b60a0345dfe72621eb2 glibc-doc-2.28-225.el8_8.6.noarch.rpm 0d2c33d3ad73b6049df6396e1691aa379ded166ada58801e971528be28ab0529 glibc-gconv-extra-2.28-225.el8_8.6.x86_64.rpm 909561e9ef8aa5934ba851f703343f0800a8baedd58d6422fb9103062c1d314e glibc-headers-2.28-225.el8_8.6.x86_64.rpm 6c7eb8e719d9ddddea4ecdfbdb8998f07fa49bf7312e23327c427abc6fa6829a glibc-langpack-aa-2.28-225.el8_8.6.x86_64.rpm a8193c0429573de931e2eb36b14498905920bd3dc463b7d46a1abefa62e787a3 glibc-langpack-af-2.28-225.el8_8.6.x86_64.rpm fce7bda507e02c956533783846da125fc6a917760f0f59822de34be01800f84d glibc-langpack-agr-2.28-225.el8_8.6.x86_64.rpm 574462a933893023670b5fd6630ebd42d7117700953b13f06d8bbee892b3c86f glibc-langpack-ak-2.28-225.el8_8.6.x86_64.rpm 78b9f2cbfb413130a25a4e11068c70a11d444b8c8791f3a6139c8f639aa648b1 glibc-langpack-am-2.28-225.el8_8.6.x86_64.rpm 380d974ee68f5a663d24b5d42eeb613972e8d702d49cb2c82d86605f59b75096 glibc-langpack-an-2.28-225.el8_8.6.x86_64.rpm 27e0f3fc5cb57c10a71fed6143645ddc7bd061bc766e4350968d63cce5441a43 glibc-langpack-anp-2.28-225.el8_8.6.x86_64.rpm 68d4083ebfde5dcf11c689961535ab0d46abe7614df7d324bc0720cbae6071bb glibc-langpack-ar-2.28-225.el8_8.6.x86_64.rpm 6bc5d8024b5c85347d7a4893d4d2ea5afcf2e3b471abdae21d1b97e406ac5fc0 glibc-langpack-as-2.28-225.el8_8.6.x86_64.rpm c051144e5e66792899cc3aa1de2e2b857b3eddabfe01480019381fed7576c983 glibc-langpack-ast-2.28-225.el8_8.6.x86_64.rpm 85e903dbfc791a5e5f028b8861ca4dfe342ab76cd93ec15c946ad5179b71d597 glibc-langpack-ayc-2.28-225.el8_8.6.x86_64.rpm dc98a4aa741cba5a6424c59bc6142560dd6da68480847f2bbc2bb75c90e4dee0 glibc-langpack-az-2.28-225.el8_8.6.x86_64.rpm c4f1d791937898719fc53bd18f1642a915f929c810ebb7b1e1a7ca546c382246 glibc-langpack-be-2.28-225.el8_8.6.x86_64.rpm 44999b5c6fdcd67d9c09e7bb62cfceddd72d673fbbd92916aefdd3e80c42ec2e glibc-langpack-bem-2.28-225.el8_8.6.x86_64.rpm 48f369f261149b15082c92a410ebae968473c83670c3f9a8a5f1b61e4a4ed0c4 glibc-langpack-ber-2.28-225.el8_8.6.x86_64.rpm 842c37f6a452cad775f80cd3d3e1a6c4b6963197a63e48336c1688c5c9dd664b glibc-langpack-bg-2.28-225.el8_8.6.x86_64.rpm c76cced954390504099b13e6c7e482b3841974a2b50d8f10f065f92d0aba1296 glibc-langpack-bhb-2.28-225.el8_8.6.x86_64.rpm 06e76903e067a2c53951b72235daa3b3d01066e5c45e7bea58190248ef030c94 glibc-langpack-bho-2.28-225.el8_8.6.x86_64.rpm b35ad53943f31d3ee9d3f8d3a4d75e1b3dfa657873adfe2da94e17a6a52f6884 glibc-langpack-bi-2.28-225.el8_8.6.x86_64.rpm 925c94822a5b2cfa80d317a74f1abd2d11c7ad110428a3b2e979001ff406bede glibc-langpack-bn-2.28-225.el8_8.6.x86_64.rpm d292406fd5403de1446b55fded0bca33000e221775ec8fa1433a9ca2302e547d glibc-langpack-bo-2.28-225.el8_8.6.x86_64.rpm 2c6fd690439f449ae5e51e7960ebd2e8f4fdba4e38144325d0c3fe62b8696d7b glibc-langpack-br-2.28-225.el8_8.6.x86_64.rpm 088353552915adc50b7088e79e0d378c1018877da925fe17477afefdaed2f95b glibc-langpack-brx-2.28-225.el8_8.6.x86_64.rpm 4653be2f7c81111e117144f42d8e3731cc8836ba5d31f2c2201e35d2781c5215 glibc-langpack-bs-2.28-225.el8_8.6.x86_64.rpm 494af6fe4f6ef1b13daf51f3f4f94878cd7adb6749636ca375b485e0f6a7efb9 glibc-langpack-byn-2.28-225.el8_8.6.x86_64.rpm 5f8c7d1a062e8dc61ecd24cd4f8ca020e134570f055e587dca95f605e9aca205 glibc-langpack-ca-2.28-225.el8_8.6.x86_64.rpm 6183b8a8c9f0bd4e89490cfc46b48a12f0a804271ccc00e06a763b5224cc26b3 glibc-langpack-ce-2.28-225.el8_8.6.x86_64.rpm b54c5cb9adebfe3ce351c9954f16d5e46f3ab7d033f662c707409c02195a718c glibc-langpack-chr-2.28-225.el8_8.6.x86_64.rpm e301b500c0b5a31d92a8fa39101f3232b2736c206887b0f9ae45e02c314be423 glibc-langpack-cmn-2.28-225.el8_8.6.x86_64.rpm 40c8b072ac800b25f7fa00f2304ae7b55ffb89fea625f9f180d6ad837c8dab57 glibc-langpack-crh-2.28-225.el8_8.6.x86_64.rpm 3659180fd6d16ddb241f891694942f1350dd02a170d1545dfa4a9ff3f8d28b9d glibc-langpack-cs-2.28-225.el8_8.6.x86_64.rpm c3910be8ce5505c68e063f4f9271d38f707081d8ae13f6b13e7ede0acef657e7 glibc-langpack-csb-2.28-225.el8_8.6.x86_64.rpm dda0b66d04173a89e18ead0ec97cb442168ff0ffc34c624f9331d16d685ecf9b glibc-langpack-cv-2.28-225.el8_8.6.x86_64.rpm 15762f58b3f8577311cdfc43fdf07c3b7121367d7d414b501d3d9d27695b79e9 glibc-langpack-cy-2.28-225.el8_8.6.x86_64.rpm 7a2e6928d67c8a4d9b5ac03379efbe824910de0b0dd3c1dc8c1de2162477fd51 glibc-langpack-da-2.28-225.el8_8.6.x86_64.rpm 47104d79af0b336a813c23e2c8a0f1e978c8751013c7241c64b31487f0b6e5e7 glibc-langpack-de-2.28-225.el8_8.6.x86_64.rpm 372efdc3f332b71d39946a366cd7b134453fbdce82b3dbb3f4fd99be425db878 glibc-langpack-doi-2.28-225.el8_8.6.x86_64.rpm 00fe2db6fb22c3d104e3d8c26e8b1328f7fc04c5859830017fd109a56e7719c8 glibc-langpack-dsb-2.28-225.el8_8.6.x86_64.rpm d3172bdfefb28621c81b15fe37f3e647145a345ce3920d28c573c7058f2d4dbe glibc-langpack-dv-2.28-225.el8_8.6.x86_64.rpm 4ab842a38363d0e08e662a506628660028781280102d994c17618137d079c18d glibc-langpack-dz-2.28-225.el8_8.6.x86_64.rpm fdc498c441ba844df6972fa6d4e8663e693185ee7ff45924b5184746c00efd1b glibc-langpack-el-2.28-225.el8_8.6.x86_64.rpm 643d70da5ea5aea17b29c1a70d281a9f2bf4e75f891bab186e7d5fe2d1119164 glibc-langpack-en-2.28-225.el8_8.6.x86_64.rpm e50c5b78013f885b3aa03820452e89f5a201ec6de7c4acdb92ce2c50b95f5b92 glibc-langpack-eo-2.28-225.el8_8.6.x86_64.rpm 7bb756e4ea2550f91e0b7d472b46bdb6f6ae9416f0f1711a049a5a511b946389 glibc-langpack-es-2.28-225.el8_8.6.x86_64.rpm 87a859d740bade85ac5aebbf2d84ace9a59710b7443fb932e9fe66d23a2c2d77 glibc-langpack-et-2.28-225.el8_8.6.x86_64.rpm f7bfac3de6c6a874d74e4ae1f3cf41175a7916b569d4a66d3e7bb1a38be48378 glibc-langpack-eu-2.28-225.el8_8.6.x86_64.rpm 48e521e1f9ca62e8639ed98895e0169c38b904b78669cc43a9c0c1ee2898ed06 glibc-langpack-fa-2.28-225.el8_8.6.x86_64.rpm b8fc96437342d00097a350b41e09f9891bc0e0200d25fe831fe7676bf2ca686c glibc-langpack-ff-2.28-225.el8_8.6.x86_64.rpm 4a0fc41ac90db32be7b8c49ba911f199ef2da3ce686e4f3717504e518e99a538 glibc-langpack-fi-2.28-225.el8_8.6.x86_64.rpm e740cafffcdbafc99ffaf1116749b66684ac52184d75d27896b0bbc2a2d1d335 glibc-langpack-fil-2.28-225.el8_8.6.x86_64.rpm 653315ebd636c695236b8f1b79ae038262fe34476b1830e1533430632702522a glibc-langpack-fo-2.28-225.el8_8.6.x86_64.rpm ddc297c140b53043c2a444e66a8e82980b168a79405d2765d5e9040bd52313c7 glibc-langpack-fr-2.28-225.el8_8.6.x86_64.rpm f19dc077c0190091631b5fd1a54a2bbddb03345fbb47294f3aaadf5aa1248677 glibc-langpack-fur-2.28-225.el8_8.6.x86_64.rpm bde45f7976769fa1e560867a68d26cde4d34e4e534d69766e12b520965f99eef glibc-langpack-fy-2.28-225.el8_8.6.x86_64.rpm 65a69b21dcf8e0bd1751520cc6d62c9c9414fdd05fa1ee76889e7e4cb2cab9c8 glibc-langpack-ga-2.28-225.el8_8.6.x86_64.rpm 4b5b37d47ded462e9e3436fc38efc25ebf922e274dd1397b340ea4be225a0b29 glibc-langpack-gd-2.28-225.el8_8.6.x86_64.rpm f449869bdc7dde79ce5573aebaa3b9d7d66acd914e17aecf1c19ea3aff075ca5 glibc-langpack-gez-2.28-225.el8_8.6.x86_64.rpm 511f24a52b63296a6fafe018837865bd09b30f87e2db6ea93308c889566c9bd1 glibc-langpack-gl-2.28-225.el8_8.6.x86_64.rpm 9b4e49dec97ba1c17aec753b36719155d16dafeff7a21e3623cac883132d41e9 glibc-langpack-gu-2.28-225.el8_8.6.x86_64.rpm e187de2c8f650ebbfe724cf39b44aa3f0f5030eff34ab9f1e4da69d44a8940c5 glibc-langpack-gv-2.28-225.el8_8.6.x86_64.rpm d2455fcd0f92ed1d86f950d39755138675863c5d82874b22a2c1b1f2f3d8f18a glibc-langpack-ha-2.28-225.el8_8.6.x86_64.rpm cb149145050048eaf3aca36b6f1e7e3280e37b36cc8205371215a1e96ecc8a51 glibc-langpack-hak-2.28-225.el8_8.6.x86_64.rpm 3f1028cc04926d4c1920be522ecbfd58e462f57b01342aa997c8658b2a81aac9 glibc-langpack-he-2.28-225.el8_8.6.x86_64.rpm 9a59df052e3b9b3648cbd1eb9e4a9ac1c9619cfdf55b756b8a678b5b2d39c647 glibc-langpack-hi-2.28-225.el8_8.6.x86_64.rpm 36060c1484746bfe7ce4d7096bc291cf3bd21fda02f8168cc2edb8f71be315c0 glibc-langpack-hif-2.28-225.el8_8.6.x86_64.rpm 3b641b1ced439107c32cb2594689995e50a97bc362140e255566ba13cbaffd9e glibc-langpack-hne-2.28-225.el8_8.6.x86_64.rpm e0a4a41bb8fe2081e789a829a2139b4167014b62117d0cf9dfb733d01fef3d54 glibc-langpack-hr-2.28-225.el8_8.6.x86_64.rpm fce670984e7dd4fb61eaad3d5ac012ed960802e472d68cead204e745be2b5435 glibc-langpack-hsb-2.28-225.el8_8.6.x86_64.rpm f193ecc94675a6778c046dd3ca0a4fa5656e7827fe0b1900f044cff670fd4382 glibc-langpack-ht-2.28-225.el8_8.6.x86_64.rpm e763c063306b93ab7e550d022bd0bee70d458e715d006992426367a3d2dd0a3a glibc-langpack-hu-2.28-225.el8_8.6.x86_64.rpm 4ce68dedb9c832d1a005fbc297a0868d7ad3ec1f87818fc2efe8c91cfd772096 glibc-langpack-hy-2.28-225.el8_8.6.x86_64.rpm 576927b5e5f9915ebfef801f59aabe7a0b39fda36531b8fc246cc993c389d773 glibc-langpack-ia-2.28-225.el8_8.6.x86_64.rpm 0beeb985725bf0ae8092bd9c9bf5050811123831e95419b717e6420444fda36b glibc-langpack-id-2.28-225.el8_8.6.x86_64.rpm 7cd6f1fc4ba92a2d3fa609fe4c984cef5519baf25a6e36d1cb32c13a51fd8e82 glibc-langpack-ig-2.28-225.el8_8.6.x86_64.rpm 8692525352ee73151963c8d499723348695ff97fdc8deaa4919a0b090a09420a glibc-langpack-ik-2.28-225.el8_8.6.x86_64.rpm 3f5a3c55fbed82e172f3360e59b22629da787705a0999a5c58ded3e151f29d73 glibc-langpack-is-2.28-225.el8_8.6.x86_64.rpm ea498f6d6be76a4c31049ff4cc0bf5b839535356693c7a568621863abaa156d1 glibc-langpack-it-2.28-225.el8_8.6.x86_64.rpm 5b0228bb27296f3ee1151c66a9e4191ad277b5cc5a7df4c9d9e54195b74ad472 glibc-langpack-iu-2.28-225.el8_8.6.x86_64.rpm 4b41dec8d1d10a91c1aa84758fb0ba0fecc68bdd58682ffdf578810047813bcc glibc-langpack-ja-2.28-225.el8_8.6.x86_64.rpm f6c923ef32fcce81ec8ed69febd319e83f458dd2da95118daef0753030549649 glibc-langpack-ka-2.28-225.el8_8.6.x86_64.rpm 4bb45a30e023e4bfcddcdbbea6ba96817e52c823c3b8f315b9e4c037b4e53bfe glibc-langpack-kab-2.28-225.el8_8.6.x86_64.rpm 7c68fc66682c4c342594adf47567b258677554c105ea5277e366acc6ebd110b3 glibc-langpack-kk-2.28-225.el8_8.6.x86_64.rpm b18a06d90e14868c29f5e6b79cd67e38cc25a27ebe8cee03e510d95280a0925b glibc-langpack-kl-2.28-225.el8_8.6.x86_64.rpm 07fab5d54710ae9b56d1f1b1202f190b4e34cdb58ac32679a18177be06088ec6 glibc-langpack-km-2.28-225.el8_8.6.x86_64.rpm 1fcfe8b21bf3f7c8f6d0624a0ff212294053ae91812d17319d13bf0272176918 glibc-langpack-kn-2.28-225.el8_8.6.x86_64.rpm 164d4c9d5a290e46ff18550c56aadb7f330f7ddc5ad7978b28392874339c80d9 glibc-langpack-ko-2.28-225.el8_8.6.x86_64.rpm 4354cc4ac2c9463e15042fe9aea44e53757e7b88a53fbf614d0897abea8e9269 glibc-langpack-kok-2.28-225.el8_8.6.x86_64.rpm 99c30b1f16fc8d312f03dab4233434636c63d7fed061a22cd2b8170bbc9236ac glibc-langpack-ks-2.28-225.el8_8.6.x86_64.rpm 14fb3b6cf1eb8db0ba95cc3cd06bbeaeeaca87bce3d947f72b0b67acc799facc glibc-langpack-ku-2.28-225.el8_8.6.x86_64.rpm 5b10db154f4aa5f9a319acd5c10f4cc6c398c209337849da13389d1c065532dc glibc-langpack-kw-2.28-225.el8_8.6.x86_64.rpm bf0c3bce31ebfde1f3cafd2d1351493d7f2ad55366bdfb13476c1f85e79b480b glibc-langpack-ky-2.28-225.el8_8.6.x86_64.rpm 2f557c8b992b6091ace8112b0269875d23d53eb7b00233ad809be6d7a44e796a glibc-langpack-lb-2.28-225.el8_8.6.x86_64.rpm 4342b171a2ca7cd66b19b9739f8570f6b416258cbef07c82510739ef2942e0fb glibc-langpack-lg-2.28-225.el8_8.6.x86_64.rpm 0c9199cfd88e2d75934e7a0c4c9151c6e1efb2d2efc3c063169a078157110b8d glibc-langpack-li-2.28-225.el8_8.6.x86_64.rpm f3ad4bcee4ad7e8b0be15db63f737904474c11deed27cd624ac399a429755342 glibc-langpack-lij-2.28-225.el8_8.6.x86_64.rpm 2b63511a575b09cc787af563c47807efe615c10e6a5f03a6172c37daa9155467 glibc-langpack-ln-2.28-225.el8_8.6.x86_64.rpm 20f19d53ac639025b897f6ad5697de6f1356e4c6e2cb4adfa595c3afa05515d6 glibc-langpack-lo-2.28-225.el8_8.6.x86_64.rpm e3ada919bab425fdc188cd150ea9d5623ff7b054e3665d9443484f099be77ac8 glibc-langpack-lt-2.28-225.el8_8.6.x86_64.rpm 44799624e1f795d60c042b94160148f6cb6d56b706155e0143bdbbed6e489f47 glibc-langpack-lv-2.28-225.el8_8.6.x86_64.rpm 087ddae7196c9b45d5ef0cba0c964bb679d22eb89011bcc0ae4fb41df098d687 glibc-langpack-lzh-2.28-225.el8_8.6.x86_64.rpm 742760100f4c20e084d130d2b996b60bc4427386ed127d90ffc9712f8edcd61a glibc-langpack-mag-2.28-225.el8_8.6.x86_64.rpm d1620b1f3feedb5b32c9bac6c07b8a51e2efe7858b020cb3e1419d7743a7b4b2 glibc-langpack-mai-2.28-225.el8_8.6.x86_64.rpm 1e44fc5603a7547f9a4a56c469184f1b68bf4c91272090cc2267b8012f5c6d52 glibc-langpack-mfe-2.28-225.el8_8.6.x86_64.rpm 31067fc4bfbf3bb89ca0ab973ed807971afc4c7e354147d02ea0fa57394d3cec glibc-langpack-mg-2.28-225.el8_8.6.x86_64.rpm 0051663124e8b2cfb0bfa63a18a8f309dc841aba7b66524ececbdf1d10e011fd glibc-langpack-mhr-2.28-225.el8_8.6.x86_64.rpm 53a98611f8f8b6cb84c3db923a3678ab255f8873c042266bd7d9f9a412e100ba glibc-langpack-mi-2.28-225.el8_8.6.x86_64.rpm cad4c35698b57e1492c3d31560b542cedb6b94ee7731c0666cd4b9b256eddce6 glibc-langpack-miq-2.28-225.el8_8.6.x86_64.rpm 756a5dcbdfd4c26a8692fab0716b1a762ac1886bf0889cf0406a36a675c37ab9 glibc-langpack-mjw-2.28-225.el8_8.6.x86_64.rpm 67346f681cdcfd9ffb017852bc43db2cf272678fcff77163a87bef3d874de0dc glibc-langpack-mk-2.28-225.el8_8.6.x86_64.rpm f3c8d7fec374cfe19423141786e3e185784bf0848e2011e9ce8ca29f00bda770 glibc-langpack-ml-2.28-225.el8_8.6.x86_64.rpm 1ec720fb6cd199ff544d437d5abb664b552f9fee982f828f584b82ccfe1594e0 glibc-langpack-mn-2.28-225.el8_8.6.x86_64.rpm 94b6797a1c444ed0823d03fa74614479b40a75d60cd9b3c6dbb09b4238d34cdc glibc-langpack-mni-2.28-225.el8_8.6.x86_64.rpm 2800bbfbe644ec4e5f56182026610bc65c91caba1cbae0258ba6d331c1d78156 glibc-langpack-mr-2.28-225.el8_8.6.x86_64.rpm 43a13514ede6dbd496171150448afebb2c885b39fe753ec9bf82212707507c75 glibc-langpack-ms-2.28-225.el8_8.6.x86_64.rpm 0a94e1d5886d5c32c0a8e71ff9a4daad6f1870907c0b71a9e8af1fc48c8d80e8 glibc-langpack-mt-2.28-225.el8_8.6.x86_64.rpm d717aa500d3eee02cb0e8b4ef313a831574c47d26a2c56511b409b43a2afbf55 glibc-langpack-my-2.28-225.el8_8.6.x86_64.rpm 7113fff7ec5bd899fc582ce98cc62c8321bec8a1e5d41a8ce4c37c83ccebc294 glibc-langpack-nan-2.28-225.el8_8.6.x86_64.rpm 9844f3f957b4aba464f9582b0bc93f38d520081cf2ea3f3ade0999551f11b291 glibc-langpack-nb-2.28-225.el8_8.6.x86_64.rpm ab5ca1d55202bde4170f920bbcc81bcd921bb3b841dc9e8d24ebcf9bf2c18bf3 glibc-langpack-nds-2.28-225.el8_8.6.x86_64.rpm 1bb920716ecee524aa0a42e37fc6a8f39e636161bb6a94c3226ad63144cb1d19 glibc-langpack-ne-2.28-225.el8_8.6.x86_64.rpm 8a9d797e5256bcdb27064289fa34ad3f7272416786fde8316fc057e76b60212a glibc-langpack-nhn-2.28-225.el8_8.6.x86_64.rpm bf1e7e41937d9fea34f3a28d3e9278019392ed51960d45bb7a8c00e7dfcd2813 glibc-langpack-niu-2.28-225.el8_8.6.x86_64.rpm b1211a9cc01e159b452a2506451db8eb52d3227c78b73dfbda89506dc1d21133 glibc-langpack-nl-2.28-225.el8_8.6.x86_64.rpm e8930cfad5f2a0de76973f794c1721e294b7d3a85fa507d5de8be4eee4b59227 glibc-langpack-nn-2.28-225.el8_8.6.x86_64.rpm 99d8fdfbbf9170f969faca0f7cd24e0fba5387aae8b520bd61614a2b6f32c12a glibc-langpack-nr-2.28-225.el8_8.6.x86_64.rpm 65403ecc25d5644980e86bac5cc48d7194f60481aa954c059a40e0914d6775be glibc-langpack-nso-2.28-225.el8_8.6.x86_64.rpm 6517f009fc6098c13955216832ab683421f7370979fab737cf252c0bffe1ac37 glibc-langpack-oc-2.28-225.el8_8.6.x86_64.rpm 48c451d2491820dc3b464d2207b11b040d27bd07b0ff699d503879df3fd383c0 glibc-langpack-om-2.28-225.el8_8.6.x86_64.rpm c85c9b10abc5f10bf25cf1b00840fbaef901992650eb43b0b0d361b1de1530a8 glibc-langpack-or-2.28-225.el8_8.6.x86_64.rpm 0b447e08580e8f91c8a71dab03d71438e3d0d86986aeb4a779e7b138d091bbd4 glibc-langpack-os-2.28-225.el8_8.6.x86_64.rpm c0ec891b7f65da69bae5962132d82305e8a886864e936a2f406c68b1109e3343 glibc-langpack-pa-2.28-225.el8_8.6.x86_64.rpm a7bc31dd3e4711fde348f17a015618e9c405da1196cf30ffeef84cf30fede538 glibc-langpack-pap-2.28-225.el8_8.6.x86_64.rpm 383707e003cf12acc1373786f51572ab68515aebbf86a7bc24e8012be8a6f9df glibc-langpack-pl-2.28-225.el8_8.6.x86_64.rpm b9128ba5a2b06e951d4700477dacfaccedd0afad09c0fa8a2779cfe9492ffaba glibc-langpack-ps-2.28-225.el8_8.6.x86_64.rpm a96b498022f261186b0c65524ad20114e433548eab4c531f895e2248bf56a46c glibc-langpack-pt-2.28-225.el8_8.6.x86_64.rpm 51ab34daac3e7b043acef093b5e82de0eda21943bac831ebb55f1b7a8faf025a glibc-langpack-quz-2.28-225.el8_8.6.x86_64.rpm 1f96f9b6f9700b41f71c2c060a0e3ce6c726a25ec4b3ef5cdcdbbe0055538e6b glibc-langpack-raj-2.28-225.el8_8.6.x86_64.rpm 0ee1c185f689d6512bd432d22aa48fb1793e1bcd676aff1a449d1003cfec32df glibc-langpack-ro-2.28-225.el8_8.6.x86_64.rpm 99462f9e1fc96210f6b23de4cd20eeaaecf7d1cccd4698a99fdf2bdb1c4281cf glibc-langpack-ru-2.28-225.el8_8.6.x86_64.rpm a07d6ac3e9ff116a5adc2fbecd5dc242106187393949f913c9be44239f20b94a glibc-langpack-rw-2.28-225.el8_8.6.x86_64.rpm 9ff46d171cca07fd7df6566114bca15335d1d8f22986930e4ac04ca704a668fe glibc-langpack-sa-2.28-225.el8_8.6.x86_64.rpm 4934fbaa1d74bb7da2c962fb59f3c73e0bda043c9fefd0293113573d1f36389d glibc-langpack-sah-2.28-225.el8_8.6.x86_64.rpm 15e12cf2e97db5fc5d4f9aa6790e70aea5778b9682f27407c9856ed4e8cc379d glibc-langpack-sat-2.28-225.el8_8.6.x86_64.rpm 2fbb5d50453b60b237c1bf680392109b9bf491379aea423c7d3e1413e062fb1c glibc-langpack-sc-2.28-225.el8_8.6.x86_64.rpm cb67e5d776c197f436121d841b7b16d0dbb0f1942fa88fa2f31cd1112aa926ee glibc-langpack-sd-2.28-225.el8_8.6.x86_64.rpm 1158f73ad54e4c2ec8df3edd92a010c447404d3c76c2f12f6d7f6844d9628c63 glibc-langpack-se-2.28-225.el8_8.6.x86_64.rpm 394a170ba0ff0555ec4d5905fd3fec581a6b2d27324cc153e9d7c8177760e7e0 glibc-langpack-sgs-2.28-225.el8_8.6.x86_64.rpm 1cd7029b298a4b42693783c965a6a2e5dfd518c0c5e69a2116b4d2e74357872e glibc-langpack-shn-2.28-225.el8_8.6.x86_64.rpm 234329e061c2bbaade5db5a05a540c5fcdabde20ef8049236985fabc94d3e548 glibc-langpack-shs-2.28-225.el8_8.6.x86_64.rpm 5aeb489130fe8dd956e55bec77d5f9cb99829725ad022178cc5a3d48ca233037 glibc-langpack-si-2.28-225.el8_8.6.x86_64.rpm 18c5a1a6b3e064d5d7c5b04199002e5f37c40baf136e73d0a1830965c034d715 glibc-langpack-sid-2.28-225.el8_8.6.x86_64.rpm 2628b24eecde483c0022e1fa4dea95fb785347b5b3896b20e95110c8213a70e9 glibc-langpack-sk-2.28-225.el8_8.6.x86_64.rpm ec54d5f336c72a3212778f1c0fd0be1c873bafa12e20c26f5b0ce1a3225e4a98 glibc-langpack-sl-2.28-225.el8_8.6.x86_64.rpm 2e574a37e5d61722e1ed06e844e1a0f774bc1a3b4f5340acd1569ab477b861f7 glibc-langpack-sm-2.28-225.el8_8.6.x86_64.rpm 9ff5ffa3df950fe98c7eb54aafa47d8af2c555709cb31bfd872452337166637e glibc-langpack-so-2.28-225.el8_8.6.x86_64.rpm c50d8dc9cfef9fccbb32624bd609452c2e214d9b4b5b7d8c292bc7fb4cb59386 glibc-langpack-sq-2.28-225.el8_8.6.x86_64.rpm e425391e7ada79c289672aa295c7b0c66a88829c2b64ceb5ec70ca982f19dc42 glibc-langpack-sr-2.28-225.el8_8.6.x86_64.rpm 093b07e99c6308899ca01a538eb49e5b89730b153a1f8960ae3270788e753af1 glibc-langpack-ss-2.28-225.el8_8.6.x86_64.rpm 3b5a166cbb39d96f09f775fae61b85d37f6d5140250156a742fdb677eaee6c0f glibc-langpack-st-2.28-225.el8_8.6.x86_64.rpm 68a8ff35796cc5d8cd00c4963b813e81ace2c43ad2533f4940053f2f7ccda447 glibc-langpack-sv-2.28-225.el8_8.6.x86_64.rpm f2b12471ac7825ce1fdb460dbf5da3f6f03958c120e3570c31f39c47ff62297f glibc-langpack-sw-2.28-225.el8_8.6.x86_64.rpm cdc89efb4bab48069f5b2fadb64a643fc4cd50863b1163d05e84405a86439f73 glibc-langpack-szl-2.28-225.el8_8.6.x86_64.rpm 5e2c703e9f45cbeebdc46098e948316e6ebe674360e240b6806a7958c5e6cb0b glibc-langpack-ta-2.28-225.el8_8.6.x86_64.rpm ee10adb0b2854a41c16ebd3d9f336d69a21aedd96a3a839353e2cf5a80de08a9 glibc-langpack-tcy-2.28-225.el8_8.6.x86_64.rpm f8d10280f6208e30368dc0f2d8dbe45ea7adbcfd421762c6610c15484354f0af glibc-langpack-te-2.28-225.el8_8.6.x86_64.rpm a8ff5e31d7cf192c9b4694dedb86417f757214b3bf1f9355d2dac825f8825b84 glibc-langpack-tg-2.28-225.el8_8.6.x86_64.rpm 137922a2530d414a3d303af77e1ea1b5496de024a612bfd12a0419df9a4a9f51 glibc-langpack-th-2.28-225.el8_8.6.x86_64.rpm b66b6a20c479be1c59baa96adf9815019c32fc9836a2334a2f4a7891e9dbec3d glibc-langpack-the-2.28-225.el8_8.6.x86_64.rpm 513ec9c727146da4a606644ac58114f9bee9056a1b00512258bbc59467fffd22 glibc-langpack-ti-2.28-225.el8_8.6.x86_64.rpm f4425b7857b14fe8a2426d8ba5860ada374bb0c5444654f6fe05cdd59fe3096c glibc-langpack-tig-2.28-225.el8_8.6.x86_64.rpm 376aaaafc05b607e79e546b2f95f1c12ebf2f8e8ae75072c945ef9b24a63b501 glibc-langpack-tk-2.28-225.el8_8.6.x86_64.rpm 0808373a62453114d9727285b8b11ebfb1053c944a0a03e43d28617d9cdac77f glibc-langpack-tl-2.28-225.el8_8.6.x86_64.rpm 4b33fedb514a607a392fd2211ea0b818bff8fae5c15245af5c69ddc976b87f1a glibc-langpack-tn-2.28-225.el8_8.6.x86_64.rpm 450de7f33f254f049bdacac877a007d1c6bd95b0bcebb2767bc09490462522d3 glibc-langpack-to-2.28-225.el8_8.6.x86_64.rpm 5d0809d12b8a497b309b6d9892a9c77d4cfcc2e01cff64f291d7063ec2b5eca2 glibc-langpack-tpi-2.28-225.el8_8.6.x86_64.rpm b910838f46e6da6fc3cf2cc1303139d1f1fe122e0342a5f3aa8657a13acc9c01 glibc-langpack-tr-2.28-225.el8_8.6.x86_64.rpm c27302bd149b126e86a44598af501ca8917fe25375bc50b14cdea6cbb9d28a3c glibc-langpack-ts-2.28-225.el8_8.6.x86_64.rpm 85458f3b7161db62bc62960f7fde9310033547c1cec1c3ed8de739d20373fdc6 glibc-langpack-tt-2.28-225.el8_8.6.x86_64.rpm 56cfdbab52c5f680bec3f8251250fbf10c91818402578d3d0471ea0518b73c8d glibc-langpack-ug-2.28-225.el8_8.6.x86_64.rpm e84f8470ff5e176f1d72922d159916a8d5f83cce22beb93cf674db33a2f7a584 glibc-langpack-uk-2.28-225.el8_8.6.x86_64.rpm 5b768dc582dcfb417637ca078907c1e8aacee9774fce9332a66600f8928b2299 glibc-langpack-unm-2.28-225.el8_8.6.x86_64.rpm 06867a95668799ebc998eb3c030c516c29f1d55dd33bc33ed7cd02d505d9e2fb glibc-langpack-ur-2.28-225.el8_8.6.x86_64.rpm 5871a229f4ad30c66ff5cc8fb1353e0a21bc9c4b5a503e3a861cff9de9536992 glibc-langpack-uz-2.28-225.el8_8.6.x86_64.rpm ce8bdb18fb3ddeb2ab68e4b9d7228b6ce98748835d58e03bd6805bb6d7b9cd4c glibc-langpack-ve-2.28-225.el8_8.6.x86_64.rpm 0c364019cca11e4d1d95da1fd4523d82dd22a62e3047e85c89b5b6b081fb1b88 glibc-langpack-vi-2.28-225.el8_8.6.x86_64.rpm 0b811802c153293cb9203d8826fa034ba67c51e4e6f0b4b0e1cead795fe08854 glibc-langpack-wa-2.28-225.el8_8.6.x86_64.rpm e5703646937fa25b1b259f0325ee35be6eb00e0ccb7e8de12ef804417c1a2642 glibc-langpack-wae-2.28-225.el8_8.6.x86_64.rpm 607844db76d90573256716efcdb0812d75716ad4135e39a7474f5d7cf5c63ff0 glibc-langpack-wal-2.28-225.el8_8.6.x86_64.rpm 17f5fe27c1e19cfacf06ec25471732f8751df19383f8d303d7a2dcce5ecd9f24 glibc-langpack-wo-2.28-225.el8_8.6.x86_64.rpm cd64e58fef883026c110cd329c7ccce5528da97c1757ad5e2177428e1019c986 glibc-langpack-xh-2.28-225.el8_8.6.x86_64.rpm 9d3feb744f5bdacd6062f73fe3bc0438e9afd346a5b50b31a508336ed98d8c90 glibc-langpack-yi-2.28-225.el8_8.6.x86_64.rpm b3c55c76660db4d3e7ccb6c7969379dadb1e81909f70e1aca2fa267c666ebe53 glibc-langpack-yo-2.28-225.el8_8.6.x86_64.rpm fe5144b5d523ce82f91fe0733a7f59c5162f44ba853fea898d91d2a59acb5d46 glibc-langpack-yue-2.28-225.el8_8.6.x86_64.rpm 5590c7c3177755374481c2f4592593b425bb1b64fef78892a5c89dc3053389af glibc-langpack-yuw-2.28-225.el8_8.6.x86_64.rpm 2e4ce6c7d625d7a66e18bf59e4081255dc0125ddc6bace4ce281d376003a5312 glibc-langpack-zh-2.28-225.el8_8.6.x86_64.rpm 247e7a8a1b9b256418ee017012b6ab664d008c02d124e9533a5d5767159b1498 glibc-langpack-zu-2.28-225.el8_8.6.x86_64.rpm 21751537d8714c7195fe09018200f070413aa1bebc35abbe3c464c8d7352d201 glibc-locale-source-2.28-225.el8_8.6.x86_64.rpm 655d9df89cf4823f6078fa3cac5c8f4ae7fad3c4a865845ec234ec0bb3103ead glibc-minimal-langpack-2.28-225.el8_8.6.x86_64.rpm 55c8f5ce51f0d74af05b0c12cc83c2646d23cbc7375006f03b3075a8816a0a3e libnsl-2.28-225.el8_8.6.x86_64.rpm a50434242a8f7f3343484bd6946a30d45e887850ef8c81ca325b4f5b4f8b1e53 nscd-2.28-225.el8_8.6.x86_64.rpm 174fc5c70faf26e0b0d5a0eacb53b3a5fb1490f5391e17d3c05a514cb9588d9f nss_db-2.28-225.el8_8.6.x86_64.rpm 4516b0bfa07e8d93e4898a8153a3674fb18c6a323ea185a1289b910c84fb8deb RLSA-2023:4517 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101) * Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602) * LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375) * ice: ptp4l cpu usage spikes (BZ#2203285) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127) * macvlan: backports from upstream (BZ#2209686) * Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198) * Incorrect target abort handling causes iscsi deadlock (BZ#2211494) * swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658) * Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667) * Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373) * Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451) * Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189) * ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366) * xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281) * jitter: Fix RCT/APT health test during initialization (BZ#2215079) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498) * Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101) * Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602) * LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375) * ice: ptp4l cpu usage spikes (BZ#2203285) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127) * macvlan: backports from upstream (BZ#2209686) * Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198) * Incorrect target abort handling causes iscsi deadlock (BZ#2211494) * swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658) * Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667) * Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373) * Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451) * Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189) * ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366) * xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281) * jitter: Fix RCT/APT health test during initialization (BZ#2215079) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498) * Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810) rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-477.21.1.el8_8.x86_64.rpm 55345b73e889ac316da109b4a88a1b72aec91de0c80690a851f0e4e4d07e8003 kernel-4.18.0-477.21.1.el8_8.x86_64.rpm cf1102c68ce85a07d48c96945356e1ab2e55783d9cd0b2e6cfc753e261559fee kernel-abi-stablelists-4.18.0-477.21.1.el8_8.noarch.rpm 46309ee4d8b9fc44ee2081582b47047f0a93384f1caacd47500761d3d10d5989 kernel-core-4.18.0-477.21.1.el8_8.x86_64.rpm 75cf4feb88db98f52e91dcb4c5df6496e31b4ed56e3d23df748379d911d17f88 kernel-cross-headers-4.18.0-477.21.1.el8_8.x86_64.rpm 98bce3ed3733138f3f97c8a520a729acec8c7d9bd4b38268c5c197e789b4294c kernel-debug-4.18.0-477.21.1.el8_8.x86_64.rpm 48e4e3c4dae74640dbf9e27daa2b856d221dc6eecc9985818f543f497ba0c1be kernel-debug-core-4.18.0-477.21.1.el8_8.x86_64.rpm 6e22930c356eba7e942415f9c6186481e1d17913859a37898a9c3b63cff0e2a8 kernel-debug-devel-4.18.0-477.21.1.el8_8.x86_64.rpm e849119aaa97f48c41e1c0ec65694f03de86269d07b81af5797fdde2ed07a76c kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64.rpm 06a4004f5bfe11fcba09b69cc403f96eb15151cc1204c8cb6e52c15b9d23f566 kernel-debug-modules-4.18.0-477.21.1.el8_8.x86_64.rpm 145b0b05912a5c49fc3dfb6bf0f0de05301e3642bacbd4925d1a7ab5e062c940 kernel-debug-modules-extra-4.18.0-477.21.1.el8_8.x86_64.rpm 2041cfc0e9a34287b8bac637c1ca97725499516f537220c2d9b6ff859ad48f06 kernel-devel-4.18.0-477.21.1.el8_8.x86_64.rpm 97df4be04c2ce5144abaf4d889f939b712292848ee25bce3b1c0727c61c98aaa kernel-doc-4.18.0-477.21.1.el8_8.noarch.rpm cdabad6a0fe918b3c9e54ab73b1565b64b75531e8b0141603cf529c46ece982f kernel-headers-4.18.0-477.21.1.el8_8.x86_64.rpm 373d9be1ce3d412b5686c1bbc217c1c3b126a00cfb3c0ceae1beaa4045e46eed kernel-modules-4.18.0-477.21.1.el8_8.x86_64.rpm a285055b3088ea7cfcf211232ddfb3bbaf1e2fa5aa98e9f985e2f99a2f12781a kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64.rpm dfedb6684255aa891c0ec1964bdeb64d6cbb40033f35dc211e11774e27910c30 kernel-tools-4.18.0-477.21.1.el8_8.x86_64.rpm 57d60403751f5ba65429921f45e805ac6c87f3f1734c73c0acf8ca0ac3f80772 kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64.rpm 2d9b5cd526720670c2df470380037b6ec4e316d983884f1a013f2158e52440f9 perf-4.18.0-477.21.1.el8_8.x86_64.rpm 4ba1bafa870db7ee3ef8d44a359f83cf0107f19c56e6bb3a19f7c50d5dd01ae4 python3-perf-4.18.0-477.21.1.el8_8.x86_64.rpm e701712a22ba072efcaa6d4ebfdbcc381ede0abac56f24dec7322fd94cff326b RLBA-2023:4518 iscsi-initiator-utils bug fix update The iscsi-initiator-utils packages provide the server daemon for the Internet Small Computer System Interface (iSCSI) protocol, as well as the utility programs used to manage it. The iSCSI protocol is a protocol for distributed disk access using SCSI commands sent over Internet Protocol (IP) networks. Bug Fix(es): * Patch3 reverts a patch merged upstream (BZ#2215111) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iscsi-initiator-utils packages provide the server daemon for the Internet Small Computer System Interface (iSCSI) protocol, as well as the utility programs used to manage it. The iSCSI protocol is a protocol for distributed disk access using SCSI commands sent over Internet Protocol (IP) networks. Bug Fix(es): * Patch3 reverts a patch merged upstream (BZ#2215111) rocky-linux-8-x86-64-baseos-rpms iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm dc229689429dbfaaf1ea2509abe3728388c22acacec3e26a67167ed624e55013 iscsi-initiator-utils-iscsiuio-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm 74fb0e3dc4275d9055d6498112b8c2fe0d4150993c183232edfe6872130ccedd python3-iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm f10fda331d9ddec5cce76dde9443b6c58dc57de9b593a9d4d74ea03c6e1d670e RLBA-2023:4521 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899) rocky-linux-8-x86-64-baseos-rpms NetworkManager-1.40.16-4.el8_8.x86_64.rpm dd6fe956eb9f152efd8ba9f4452cfe345012846b67f37016667e28e5529c6dc1 NetworkManager-adsl-1.40.16-4.el8_8.x86_64.rpm c230e50306c7a5dd850e88caf026b6684b352598597fb7e0ac913cf4d380c570 NetworkManager-bluetooth-1.40.16-4.el8_8.x86_64.rpm 4b05e6da83dc34c9c100be5787fe0fc85ce33b7d6345e2af72454c56a2f35f14 NetworkManager-config-connectivity-redhat-1.40.16-4.el8_8.noarch.rpm 3fa816eb686a631eaf6dba0a376d071c52b04973b1a0a3fc863ece672f573c52 NetworkManager-config-server-1.40.16-4.el8_8.noarch.rpm 56e20b73c67df24520b3f71346b1151167269bb65cdceef53588df7fc8955432 NetworkManager-dispatcher-routing-rules-1.40.16-4.el8_8.noarch.rpm 861ccc3c0b0ec2b7714971e08282120aef53e31e667a3d23ac9b7013c0de1038 NetworkManager-initscripts-updown-1.40.16-4.el8_8.noarch.rpm 0cf9f96f80808ca6ce9804779d9efc64cc564c8b7cbb98afc5c5f1315e7340cd NetworkManager-libnm-1.40.16-4.el8_8.x86_64.rpm 7d77e3830f82d731e46d8e58925f506c7dae25a7e5047bce61280b3285bda092 NetworkManager-ovs-1.40.16-4.el8_8.x86_64.rpm 0050dd48b556365092151ad021dc55fee60bc96feef716742fc734abe2459f7f NetworkManager-ppp-1.40.16-4.el8_8.x86_64.rpm 83b4e6a4ba32dbd01b11ad673fcfd3d94eb2a3e3d479c44275f9f1d8df663d80 NetworkManager-team-1.40.16-4.el8_8.x86_64.rpm 7f7445900f0bc4d37d06fa80488fdf85ca0a4a89615822648883201cbcb267d4 NetworkManager-tui-1.40.16-4.el8_8.x86_64.rpm f1e707a71f55065e501451e0fc94c873e1cdf4e7d0786ba5472160310af779b0 NetworkManager-wifi-1.40.16-4.el8_8.x86_64.rpm 1d6e45df32aee940e3a207823a8490286b141fd3a7215ec456099427979e655a NetworkManager-wwan-1.40.16-4.el8_8.x86_64.rpm b4dc38fd5c8553cd8902317e6ae5c494c9c39966fdf875716cc08c3e6cb44af8 RLSA-2023:4523 Moderate: curl security update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: GSS delegation too eager connection re-use (CVE-2023-27536) * curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: GSS delegation too eager connection re-use (CVE-2023-27536) * curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms curl-7.61.1-30.el8_8.3.x86_64.rpm ed2fd88c5440ecca9540d7dab76ebbc3fcea69e9f773128c8c719f0b61ae9627 libcurl-7.61.1-30.el8_8.3.x86_64.rpm 8140b42a09de333a2a8534b8386f7a4fe9b1ea727543c1dea381f7575e90539c libcurl-devel-7.61.1-30.el8_8.3.x86_64.rpm 22cf4d9837c5de50a0925964af93e80104776f32bd891e77fd5dc1c90f3212a7 libcurl-minimal-7.61.1-30.el8_8.3.x86_64.rpm e2755e4f7816cce3e652dd3dfcb98480ef83724ea5033b6242186c0ab4d64d66 RLBA-2023:4522 grub2 bug fix update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * HTTP boot issue on RL300 (BZ#2221202) * Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * HTTP boot issue on RL300 (BZ#2221202) * Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972) rocky-linux-8-x86-64-baseos-rpms grub2-common-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a419f460ebd079f4838ee8b3f35e862106c969e5530702380e708ecba8047992 grub2-efi-aa64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm f88cc3e63d47e8eb411a43fd713c961c90f355f4056cfbfb70d3145155c273c0 grub2-efi-ia32-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm b1552265ce9c6812688d394a2fdf9c93c2a729d4a3049363540d38cd72eb3245 grub2-efi-ia32-cdboot-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm 88a1c8d600e0889db45977df024a9c15953dae2bc1f31e38334a606b393df488 grub2-efi-ia32-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm 4d033cf7ef4c6deb674888486a6eeef5bc976f23e3aec92db83a759a71e430bb grub2-efi-x64-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm d1942f696fb2761c54eb34fa66e64ee9233e89cd882c96c3d2914204a09d6070 grub2-efi-x64-cdboot-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm ab446b51edb4bb7cb089efbc14522a7a941f7cf8610eac701105aea150db197d grub2-efi-x64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm ea5673584ba5557b92e950255c9746c4925a1ce4557a54993955e9dcbc11444e grub2-pc-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm 8f94bb2c9dfb1465fa0c8163ab641b2f581ab250735c319f80ffa26ba878a061 grub2-pc-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a177c63e0f25d5da4afafc7ffacbf31c76f6a1105321cce74d755682d3811c17 grub2-tools-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm 7c724479d906b9606037eef80e0039e0fae8d8d5ae5716687bd2f04496089a4f grub2-tools-efi-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm ae1f4704b0c6bc82e779c572a3d6469e35e03279cb4a65bfc66cf3302d18d3a3 grub2-tools-extra-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm e039fe406ff0c98f589da5326bf3370c20ded57ff6b75e87077eea4130375747 grub2-tools-minimal-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm ce1fb9f8e0d85fcc36a3a54f5cf82489049ddb512afa09b75820a287d35056ce RLBA-2023:4525 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838) * SSSD enters failed state after heavy load in the system. (BZ#2219351) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838) * SSSD enters failed state after heavy load in the system. (BZ#2219351) rocky-linux-8-x86-64-baseos-rpms libipa_hbac-2.8.2-3.el8_8.x86_64.rpm 70766413d5a52c92e3bb224459f8184c02518f8630d1073b63b593cb28b7b37d libsss_autofs-2.8.2-3.el8_8.x86_64.rpm 8edee8b77c8b3bf56e7ec9a011505114055ab8b7f5a31a436182e80ea297785f libsss_certmap-2.8.2-3.el8_8.x86_64.rpm 1d48fe634b4c5d4069677150595ce30f17d4e0c9716e613126e829550ecc187f libsss_idmap-2.8.2-3.el8_8.x86_64.rpm 66dc16e4d6a65e569d2a6ffcba6c64936bcbd8a3e1fa65d8ea34d044269a5aab libsss_nss_idmap-2.8.2-3.el8_8.x86_64.rpm 71c3f8b5a754793861fc5ba41c1f1ee9507f526522ac5f4cca3b01577ec4234e libsss_simpleifp-2.8.2-3.el8_8.x86_64.rpm f2608aa7f0de0e59272baf812a973432cf633da9a41b3f1cd3e0d6f65c7f501b libsss_sudo-2.8.2-3.el8_8.x86_64.rpm 4f470f35ba8acc9385ae63a95583a8c82d2acfeaa0b6773b19b797736dfd94d6 python3-libipa_hbac-2.8.2-3.el8_8.x86_64.rpm 06012e2efb30f8a70e2646433d3b1126ec476e6ca53b426bd4c0c4346f2580e1 python3-libsss_nss_idmap-2.8.2-3.el8_8.x86_64.rpm 4dda9c68f5ee0fedd47a6197c62754e85eb6bf1601b38934623a6b13c1fd5228 python3-sss-2.8.2-3.el8_8.x86_64.rpm a213d7e10a526fbf5eec531ae3b6c670889459b3a114a1bf103011203434ac1d python3-sssdconfig-2.8.2-3.el8_8.noarch.rpm a5f0f60d75de585d424896b1228fcfb9d99c3514e69ac32931a7b926d77eb49d python3-sss-murmur-2.8.2-3.el8_8.x86_64.rpm 4717eacd40c9038e56c756578e29c4fe13f7186040a85a9fc0043867a6de941e sssd-2.8.2-3.el8_8.x86_64.rpm 7b9dbf4fd5869bdd1cd44387a8fc71117a178c38ec0c150c2d4bf4e3051c67e7 sssd-ad-2.8.2-3.el8_8.x86_64.rpm 9db0f73f65cd73beebb4de4fa717fad97ed60999d3dbf6a2bc170c12030d62e8 sssd-client-2.8.2-3.el8_8.x86_64.rpm d926b55209f8bbaf4db84b629adf3d314abbd6e8116f7319976428fdf3591280 sssd-common-2.8.2-3.el8_8.x86_64.rpm a2d4bc97be471d65ddbb5297c7fc80e2aee8230e9c126aa3c7849012aae1b35f sssd-common-pac-2.8.2-3.el8_8.x86_64.rpm 41e550c5b5ba11583faa82b89757786ad8c536698f4a4db6e9589474da9729f3 sssd-dbus-2.8.2-3.el8_8.x86_64.rpm c964249621dbbc788cef2b5489dffad152f80aab220bfdf9f6c5a3e244d8d022 sssd-ipa-2.8.2-3.el8_8.x86_64.rpm 21341643762afa65d3cea2f97d21b4c14331b7ee8536a4a35a0af9b96464272d sssd-kcm-2.8.2-3.el8_8.x86_64.rpm 139984608f31a9c073f8538c447636c92f9e682f277654a76d36a8ac0350d06b sssd-krb5-2.8.2-3.el8_8.x86_64.rpm 60d2b12e295096dc2eea423028955460243b93cfb9149d0458a75fb629664a76 sssd-krb5-common-2.8.2-3.el8_8.x86_64.rpm b68513cd3f38df8e748e1815c95234537f4c23e21ca12f2417a39a1135eccab8 sssd-ldap-2.8.2-3.el8_8.x86_64.rpm 0f7fdda9309f544793fbfde4576c4f3c40ef600b1d5fdabce2c1270e9fa66cf6 sssd-nfs-idmap-2.8.2-3.el8_8.x86_64.rpm 81fb82f432216f562a6864310c775e86b7ea3376ab615550362bfabe6b23d2be sssd-polkit-rules-2.8.2-3.el8_8.x86_64.rpm e219019be7072c8adb77048527522a276bb8521220361294c9ed56319c00050d sssd-proxy-2.8.2-3.el8_8.x86_64.rpm 79680b5e0c1ac8430cb2c442c96e5a8e4d2dcd963430675d39a55d9e62afc63d sssd-tools-2.8.2-3.el8_8.x86_64.rpm 2ba37a5bfc294b077df409d870c48a8e414dc6e1f89b09030c6c0731f157284c sssd-winbind-idmap-2.8.2-3.el8_8.x86_64.rpm 6a34af96ec51fcef77da677b1403f4436d87c5fd9ac8c2746d436c9ef44fff57 RLBA-2023:4526 systemd bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602) rocky-linux-8-x86-64-baseos-rpms systemd-239-74.el8_8.3.x86_64.rpm d3a7490b43fe7177e2527ce158382812fb2432efbe60e9157d386e8675685fc3 systemd-container-239-74.el8_8.3.x86_64.rpm 43c10ceb96682d069179c98f88f4fed1310b8cfd4fa1bcfd45625ee0ba01c4bd systemd-devel-239-74.el8_8.3.x86_64.rpm 16cbde9776616e5d7e62f9100fb4d21ff84657b1c85d9beda6a2b01806d138c9 systemd-journal-remote-239-74.el8_8.3.x86_64.rpm 4d2b0275d3104dfc528af376f7c77a0f947eddf5b16574c690e0ab6a3d4ee7e1 systemd-libs-239-74.el8_8.3.x86_64.rpm bb8302d0082c3d3c6025e151f347dda507476135ef10ac16726d6969493d3997 systemd-pam-239-74.el8_8.3.x86_64.rpm 81495002cd02850cb9a9b8c9b07b18e1b4e0281fa59bd7e57c034be165f3a763 systemd-tests-239-74.el8_8.3.x86_64.rpm d3d56b9ec25c1f5529080d356d201829feb4d2c4244ba3f19a535e2b981c46bd systemd-udev-239-74.el8_8.3.x86_64.rpm b7a741f10f900f6d093560ab546508a8e61a12ddeb0f15c6060553e33e0e321b RLSA-2023:4529 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484) * libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484) * libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libxml2-2.9.7-16.el8_8.1.x86_64.rpm 74abab4edeffd38c30737de94a392346d245af9b30bd1b298fb456af50de721e python3-libxml2-2.9.7-16.el8_8.1.x86_64.rpm 5daf6a85973edba5c14a07cefac1e2579728c79b8e9be640869f4d6b0bcd47ca RLBA-2023:6797 xfsdump bug fix and enhancement update The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es) and Enhancement(s): * xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493) * xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344) * xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es) and Enhancement(s): * xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493) * xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344) * xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677) rocky-linux-8-x86-64-baseos-rpms xfsdump-3.1.8-5.el8_8.x86_64.rpm 832a4dc59a3ad9e62a2e8d594b6eda910d712ea2e822a8b4fbc7ed7ef2f0c4c8 RLBA-2023:7080 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kexec-tools-2.0.26-8.el8.x86_64.rpm 9ae81e7de390624533ad29cd87f19744783e988cf66af60faf7e2af8d14244e2 RLBA-2023:7182 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tuned-2.21.0-1.el8_9.noarch.rpm ef47db5a44f0baf742d952864f77eb147a5f08e31b46a9e5d8882fa0990187b6 tuned-profiles-atomic-2.21.0-1.el8_9.noarch.rpm 98a338f12a63020fcdf807492e79f6ed8d4076da7c2c3b82a35012634f5a8477 tuned-profiles-compat-2.21.0-1.el8_9.noarch.rpm 37181c66d77dba3580bb77f2ea8938ade58f363239abbd5a6968f04baadc28c5 tuned-profiles-cpu-partitioning-2.21.0-1.el8_9.noarch.rpm cb9a5795f21ab5e4507f69cb4db2f33a02096f205036d669930cc1fe2a5abe6e tuned-profiles-mssql-2.21.0-1.el8_9.noarch.rpm 13487cb712d7a39c5f61b9f63001683d8ef43a66336b819154c9d0ababcdffe7 tuned-profiles-oracle-2.21.0-1.el8_9.noarch.rpm fd5ed5219eaf524c75e2fe142df87fcca0b86c4c5faafda6229c0e92f24cbef6 RLBA-2023:7185 nftables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms nftables-1.0.4-3.el8_9.x86_64.rpm 5054bf9eab20fdbc97bc47f1d30a3fd1e80cefa915d0e634c865b4fd8095996f python3-nftables-1.0.4-3.el8_9.x86_64.rpm 19ac6c94f37f8224301db112ecabc9fe3c1e123630c91ad1e8df500956db9eb5 RLBA-2023:7186 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libblkid-2.32.1-43.el8.x86_64.rpm ea6bbe1d9b8b42e1ba582cf1c67a8a9e95b2a7bea96751576d1a32f324f5fcdf libblkid-devel-2.32.1-43.el8.x86_64.rpm 43053d38b46a6a5aa1d9087b939109a265c1816deadc9916ac3d464ff6ecd490 libfdisk-2.32.1-43.el8.x86_64.rpm 25a410dd430b16e2269f55c6036c7e4946f81d932fe5a98e072a61c48f947ef7 libfdisk-devel-2.32.1-43.el8.x86_64.rpm 2ed6acd763040b750875464f8560ee078b22546cd7d1701176355499b30fd237 libmount-2.32.1-43.el8.x86_64.rpm 043db826bf4e77a522b64bea03fc63dbd5ae29c23fdd4ddfcb527742afc5700e libsmartcols-2.32.1-43.el8.x86_64.rpm 28a333ebe4ecaa606c1a67726afafc3db9ce46be48bd832f6c0ec59bc7f6e82b libsmartcols-devel-2.32.1-43.el8.x86_64.rpm 53f0f834cdc59c7fa61b21eab0ed656b69c4454f5300eb46645c7f6b16a87ca6 libuuid-2.32.1-43.el8.x86_64.rpm 99e83acda94db42e74928e773ea02dcd59143baf7d8412c445a0fe3d2cedfd79 libuuid-devel-2.32.1-43.el8.x86_64.rpm 8b23849fceb27df7dffe78f209151e7536ef38d98253afbde350e1a0bf1e4c25 util-linux-2.32.1-43.el8.x86_64.rpm 9bd12357e95be98bfc51645ddea9724521b4bb0aaba87d107b308d0225059465 util-linux-user-2.32.1-43.el8.x86_64.rpm bfb7ad5153c88e3ef6440af9b8d17574973a4348b78960f64ff850ba7eacb6d3 uuidd-2.32.1-43.el8.x86_64.rpm 8bf822c883b4547e8b53c2c6cd39aa4fc4d051935dd22881ae504d600df75805 RLBA-2023:7188 dmidecode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dmidecode-3.3-5.el8.x86_64.rpm b7149e0e49e75548a936ad601c0b87936a0b60d5e8e8537d7f5666ade450dc56 RLSA-2023:7187 Low: procps-ng security update The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms procps-ng-3.3.15-14.el8.x86_64.rpm cbbd805508836bbc260c452a30a534c89e41863a3c129bb863448732f8cd6e1e procps-ng-i18n-3.3.15-14.el8.noarch.rpm 821a3db12b38137553beaab052f93c3223d3952bf1db6458042609122e967dbd RLSA-2023:7189 Moderate: fwupd security update The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms fwupd-1.7.8-2.el8.rocky.0.1.x86_64.rpm f0ac61cc2555853e24b8be27f65ce062ffb61f5445164b7a83083f2cabbe1232 RLSA-2023:7190 Moderate: avahi security update Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms avahi-0.7-21.el8.x86_64.rpm f8f0eec1cc1075ba639588cd28af6b9cb89df6fd29279271037190b836eefa9a avahi-autoipd-0.7-21.el8.x86_64.rpm a27aac9bc18aeb6e011d0a4847e989724c51b7bd6818912c896049e9ce31156b avahi-glib-0.7-21.el8.x86_64.rpm 212054d8ab063917f7a442e251c61a1b7628ed59fdda6346ff191e41cf2bc34d avahi-gobject-0.7-21.el8.x86_64.rpm 27941dc85d64a04023074171f346fe87e2422656318e0c8385221a962cb3c155 avahi-libs-0.7-21.el8.x86_64.rpm 5f2fa3639ff92a250a251d5b3bbf8487cdccc1fd70abddeca9a2f39ce20bffb5 python3-avahi-0.7-21.el8.x86_64.rpm 483f92f1f8f393fac6d7ac81e04c13b7d3bb30d7179d445fcec45fa006d94b8e RLBA-2023:7191 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms device-mapper-1.02.181-13.el8_9.x86_64.rpm 529004b1bfd6befc13b3105df4c991ce80b6c660d3dc63819b347029773092ff device-mapper-event-1.02.181-13.el8_9.x86_64.rpm 0343b170f441a5d3a8a33ed1e1653d14fe321bba186f108a1573cf814f5b3fe3 device-mapper-event-libs-1.02.181-13.el8_9.x86_64.rpm b88ef7e099f9a3f4ad6ffed923f9179b1a705ba8075e61ec93ed55a249013c04 device-mapper-libs-1.02.181-13.el8_9.x86_64.rpm 081444cffaf1a52e81caa4fed8a655a4e53ff84fadd33d6eb27627ee8201bfb1 lvm2-2.03.14-13.el8_9.x86_64.rpm 5c31188a205a414e8334462fcfc8432522d7a7df35dddf016c0c2a4478320c66 lvm2-dbusd-2.03.14-13.el8_9.noarch.rpm a8519cf7f02e592e61b33dbda1b53c5467356db8be66948b81b0ff9ec49ce711 lvm2-libs-2.03.14-13.el8_9.x86_64.rpm 706102f2a090bb435e1161e30b3347274ac7c8199d252579207d1b095e7905c3 lvm2-lockd-2.03.14-13.el8_9.x86_64.rpm 8fca5e0cf94f1cd227a08673fc59f571a04a5dc3f28d065cce937c75628f0166 RLBA-2023:7192 numactl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms numactl-2.0.16-1.el8.x86_64.rpm 60ea415c6376e01845cfd49758b44ac0841ed035bc5183260aa3322922b1e1f0 numactl-devel-2.0.16-1.el8.x86_64.rpm c9ce8a9ff18efe9bf5e69b1cb9fcb128d8bf89f34749cd9d05d03d5c7bd8b0f5 numactl-libs-2.0.16-1.el8.x86_64.rpm fc54a273a43348ded02eb1966b9607447d5cf527669250c67c21c18762966860 RLSA-2023:7207 Moderate: c-ares security update The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217) * c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217) * c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms c-ares-1.13.0-9.el8_9.1.x86_64.rpm 405c835c82f99de95b80bccd85a90e821d67204ca13036968c85cda20d0830b2 c-ares-devel-1.13.0-9.el8_9.1.x86_64.rpm fa74fa0269e0e94dbb8c0cd07df0da96094049e88b51e64e2022a5f1cf55785b RLBA-2023:7210 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414) * SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414) * SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302) rocky-linux-8-x86-64-baseos-rpms libipa_hbac-2.9.1-4.el8_9.x86_64.rpm 073fcab34ee74a862843e1186c6c469304c6ea96dd960639ad7e655e2f7d866a libsss_autofs-2.9.1-4.el8_9.x86_64.rpm fe30cb8c8c429d5eae9c2b0ecd21fe6e1999284d574658fd1bfce7f8152fe7b4 libsss_certmap-2.9.1-4.el8_9.x86_64.rpm 72e1960b515f57e8aa01be969c75def7d14bb1c208eb5f9cac8c9f96f3276332 libsss_idmap-2.9.1-4.el8_9.x86_64.rpm 29512c90e2b57634c5b7f1afaaf9819777e6bf91e1c87f9c7663b520f31d5edd libsss_nss_idmap-2.9.1-4.el8_9.x86_64.rpm 8492e5783fbcd71072b998aef57d61fae9215a3f1f6a6353559790ee77317198 libsss_simpleifp-2.9.1-4.el8_9.x86_64.rpm 3fe441649687d6bf3991b3288eb19742fcb9f476bac1f34368a4952a39a26c71 libsss_sudo-2.9.1-4.el8_9.x86_64.rpm a5f9f3cbab2721a11fe241f0ffe8a6e7d5bfd7fa70f9f05bbf7cacd6c8252d95 python3-libipa_hbac-2.9.1-4.el8_9.x86_64.rpm ce3f2e441b967cc4324e5dc5f9591f4803a6e2e06efd6f46de32a3bffd9f78fd python3-libsss_nss_idmap-2.9.1-4.el8_9.x86_64.rpm a0fc3ae4e61f08f667e97c01df71decb833448357a583266ee044865f7e491f1 python3-sss-2.9.1-4.el8_9.x86_64.rpm 5591af507fd55def3ecf1896b2bb132116440fb1ffed9b3eeaa2952ef791e424 python3-sssdconfig-2.9.1-4.el8_9.noarch.rpm b148427ebe8ec952f6cafa76baaa0c3d10cea8d467e4da4c60b3907c08fdfa3a python3-sss-murmur-2.9.1-4.el8_9.x86_64.rpm a171db8ded3d0aa02acf774add36da10dccab762d9019c26354a9954ea7fb268 sssd-2.9.1-4.el8_9.x86_64.rpm a38bd72377448d7883ad701cfa9ba68d873667a78ad3c508f433bdd3c0b4b62c sssd-ad-2.9.1-4.el8_9.x86_64.rpm f1597c9b264e87903e49cf8bd678848c7dec60aa89cdd144c09f187b0813fbc2 sssd-client-2.9.1-4.el8_9.x86_64.rpm e5fccf67b0feafc4487c487e5253926790ad8d3c021ed46f3011d79c709cbfba sssd-common-2.9.1-4.el8_9.x86_64.rpm f59dbd72a22aa9d1adc39b656b675dd3f93488ed4159a5eff27b9b2c3d7ca183 sssd-common-pac-2.9.1-4.el8_9.x86_64.rpm 37c0d94f9f09f3734a5a7a813da47de043aaf5e46f80f198c0fdeb9a17bbe792 sssd-dbus-2.9.1-4.el8_9.x86_64.rpm 6093c7927cbbd6c21091d70afefe59b988475036590ae42ca60d616dfaadc91c sssd-ipa-2.9.1-4.el8_9.x86_64.rpm f06c63e4bd1bd4ce087618360e5b442f9f6a33bb3e9de1c410cd8e802a3ddea3 sssd-kcm-2.9.1-4.el8_9.x86_64.rpm daf0145eb64ea43ac2c9f9d2d1ed0f8c4d7bd7bccf70cc512bdde7482cfe0eb2 sssd-krb5-2.9.1-4.el8_9.x86_64.rpm 7e0b92f6ac339d63a2ed8b8a10ac008c8963bc2d5aaa9f459a726367b9798d1d sssd-krb5-common-2.9.1-4.el8_9.x86_64.rpm 245d72a2ca2153cc215493e5902e4aaf3b623d119036dea5fea1311bb6b629b5 sssd-ldap-2.9.1-4.el8_9.x86_64.rpm 5541cd682ad7602ed72f7f59caa2fcd6b4fc63730596c0d0cfbf2ac9f28f7943 sssd-nfs-idmap-2.9.1-4.el8_9.x86_64.rpm e4f04e49a04e87160ce729d3035ac7abd3ac329068d8d4481f0c9974555817e9 sssd-polkit-rules-2.9.1-4.el8_9.x86_64.rpm 8de4c0d6022279dbfe6bfac633ab8b74ca9c552006f1caa208217f25ab3feafd sssd-proxy-2.9.1-4.el8_9.x86_64.rpm fc04e93bd4c9f2770e0f8eaf75ef78a5067cc59831da2a3909478bb8ed89e67d sssd-tools-2.9.1-4.el8_9.x86_64.rpm 53aa6aba3d4bdcc837ef408c6ea5615b4a07138a18063936067540b82e8af295 sssd-winbind-idmap-2.9.1-4.el8_9.x86_64.rpm da00ac04183957743400e0ab305053b6c107e3c423bfabe98ddd2959dba1bb29 RLBA-2023:7211 krb5 bug fix update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514) rocky-linux-8-x86-64-baseos-rpms krb5-devel-1.18.2-26.el8.x86_64.rpm 7a45a46f6debb2f19c95c3a9a6399edfb10210cd0762fe672f6cb270359e03a7 krb5-libs-1.18.2-26.el8.x86_64.rpm bea60f99cd8adc50dc741aa911ed1a38c89e2a6d5bedcb763e32f10b045bc319 krb5-pkinit-1.18.2-26.el8.x86_64.rpm e8f4443cc49a23c23d4408c6fe53f345fe08400c16b48499c7e266f62c7866d1 krb5-server-1.18.2-26.el8.x86_64.rpm 3d1b472e1dfa1a02a082e983757db1f36aca29811923d52fe6b93f628a81c777 krb5-server-ldap-1.18.2-26.el8.x86_64.rpm 885d066ddb7462d36c8cfa6e9ae0f0bace3cbaf67399016ebec2889fdd09c02d krb5-workstation-1.18.2-26.el8.x86_64.rpm a6e5e4a0d9afc85aac2d3fd7d3caff64942dc9e530b8c1dfe922bafce0238c46 libkadm5-1.18.2-26.el8.x86_64.rpm bcf270ea041d0e9bf071b3fad421121cbd1d006acaec202d9e551d8562d2b1cc RLEA-2023:7250 microcode_ctl bug fix and enhancement update The microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (Rocky Linux-15864) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microcode_ctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (Rocky Linux-15864) rocky-linux-8-x86-64-baseos-rpms microcode_ctl-20230808-2.20231009.1.el8_9.x86_64.rpm ed6bd8bb64fd669ce22c878f610109bb5cd4c31ba64821593ebbeb463da4318e RLBA-2024:0111 selinux-policy bug fix update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427) * AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427) * AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274) rocky-linux-8-x86-64-baseos-rpms selinux-policy-3.14.3-128.el8_9.1.noarch.rpm c7433d674d6f5d9a7a8bf0ea180d467e6f68f113ad23a099be84b71ca8a56c03 selinux-policy-devel-3.14.3-128.el8_9.1.noarch.rpm 7fe0299de89fcebcf37a86be62b57736b0c5557f4d182a664a3ec58d16989d1a selinux-policy-doc-3.14.3-128.el8_9.1.noarch.rpm 9471f6adb2710ed4bfcc6695e4bd72e84b0f4c79d9717d554a585ff319b63eff selinux-policy-minimum-3.14.3-128.el8_9.1.noarch.rpm 072fc4d0e4315817acb5b0ce0f1bc930e81f9c22c604e2870c133ff77f74ef3b selinux-policy-mls-3.14.3-128.el8_9.1.noarch.rpm 0d1ad8a88f168fb39c385ab5e4da73b2c458a9b4b06dff84896f688f2ecf1c6e selinux-policy-sandbox-3.14.3-128.el8_9.1.noarch.rpm 3e3c5e2e37404331b64f013dd313d08444612b6bffa1114de993772973492762 selinux-policy-targeted-3.14.3-128.el8_9.1.noarch.rpm 7e06389eb99b9c66b0cf8e3459816672d2603a5b87094c6ba8bb7e56c95c5dd2 RLBA-2024:0117 libcap bug fix update Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Bug Fix(es): * libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Bug Fix(es): * libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362) rocky-linux-8-x86-64-baseos-rpms libcap-2.48-6.el8_9.x86_64.rpm 1d7e73484f9be2f94802516786c5218d01d7c8c297369e6b7c9fac4d7e9b67a8 libcap-devel-2.48-6.el8_9.x86_64.rpm 64a4046e694c5b4ce148de9caad17b8d331b3f708c23b2365a86f7af99b64a83 RLBA-2024:0118 xfsdump bug fix update The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es): * xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es): * xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494) rocky-linux-8-x86-64-baseos-rpms xfsdump-3.1.8-7.el8_9.x86_64.rpm 80d43fca687ae6c8d19200488d42b0a93f616b240c30d70001dfcf9c81169366 RLSA-2024:0155 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms gnutls-3.6.16-8.el8_9.x86_64.rpm a6c6051da918f40eb7f4952645a2ad12f9143f254336f9a982349b2bb1a3502c RLSA-2024:0253 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms sqlite-3.26.0-19.el8_9.x86_64.rpm 88da14af450d5762afe0edb15216ea2738a217793475ecb5d2993123c0538556 sqlite-devel-3.26.0-19.el8_9.x86_64.rpm 1350a240e67a80c082b21a799a1a368ef0f4c355950bad72a71ab55b9a6bc258 sqlite-doc-3.26.0-19.el8_9.noarch.rpm 062df3cfd98abe04f209e6412438476e99f396b73ff1308ba4ec9c799a482e79 sqlite-libs-3.26.0-19.el8_9.x86_64.rpm 9ee554eb9a65df5f5295a37c860bb32dbddc4731223a980f849d2068c6fb33ed RLSA-2024:0256 Moderate: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm 00c6d17ed20bf8f01d7375497ac5ba77990dbbc45c02e37bdc097a095e44f541 python3-libs-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm 3117a3990aa7596483a4a3b62a0d4f5d7e83a21c4a690cd2b0b8bcd9231173cc python3-test-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm 906e37f205f0a62cf9770261f01a465fbeedc68f553709248debc71f03dae300 RLBA-2024:0898 python-cryptography bug fix update The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. Bug Fix(es): * [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. Bug Fix(es): * [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873) rocky-linux-8-x86-64-baseos-rpms python3-cryptography-3.2.1-7.el8_9.x86_64.rpm 43ee033b549f4a2b862edd008cbf41374882c0cbabf5d4143f7a02b661bfcc83 RLSA-2024:1601 Moderate: curl security and bug fix update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218) * curl: more POST-after-PUT confusion (CVE-2023-28322) * curl: cookie injection with none file (CVE-2023-38546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libssh (curl sftp) not trying password auth (BZ#2240033) * libssh: cap SFTP packet size sent (Rocky Linux-5485) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218) * curl: more POST-after-PUT confusion (CVE-2023-28322) * curl: cookie injection with none file (CVE-2023-38546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libssh (curl sftp) not trying password auth (BZ#2240033) * libssh: cap SFTP packet size sent (Rocky Linux-5485) rocky-linux-8-x86-64-baseos-rpms curl-7.61.1-33.el8_9.5.x86_64.rpm c395c8f0f93726d40b0a7ddd835bd54477172d80b3d9217b59e19028d471c213 libcurl-7.61.1-33.el8_9.5.x86_64.rpm c1d0f1fd52c2ebad2365531a42e91d79af21d34b173c41e0ca19827e072f2a6f libcurl-devel-7.61.1-33.el8_9.5.x86_64.rpm 11131122c4f29bf3e9d143faae3efd008e2bd1f4d96993150bd1947af21b83e2 libcurl-minimal-7.61.1-33.el8_9.5.x86_64.rpm 151ab6c706d7aa8eaade81a63585ae421ac91f12d179a7891cd6935f6ea18a61 RLBA-2024:1604 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600) * [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600) * [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968) rocky-linux-8-x86-64-baseos-rpms NetworkManager-1.40.16-15.el8_9.x86_64.rpm 48da1b81cce6b3b83a482cfb8e6d7676a1bff7f7674b87631e9def6a7e30e073 NetworkManager-adsl-1.40.16-15.el8_9.x86_64.rpm 474a026ab535777c7264755efa9d776bc877d443d6ff3fcae81c487c12105885 NetworkManager-bluetooth-1.40.16-15.el8_9.x86_64.rpm 86d13c3405afe0f1610e384a47de5ce6055704395ce5e837d6dadcd9892bfb81 NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm 7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44 NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm 705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30 NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm 6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93 NetworkManager-libnm-1.40.16-15.el8_9.x86_64.rpm 3911b290a4f36569df75674b8a959d9771972ceba5c9e0d067c4af3305c462d2 NetworkManager-ovs-1.40.16-15.el8_9.x86_64.rpm c79c415939f051f3bad78797a287a0531e131e8ebc1c166ca7abcf381c669965 NetworkManager-ppp-1.40.16-15.el8_9.x86_64.rpm 02bc73184d084a76dfaa8e7144f883e96067b501c9b09186a5231fb42047c483 NetworkManager-team-1.40.16-15.el8_9.x86_64.rpm 3f4960bf57e6c4264125b181b3f3a236431616f4e8f7c820ea34906c2c296f94 NetworkManager-tui-1.40.16-15.el8_9.x86_64.rpm ee87c160b59aa7ac7c0bf3e3cc1a5850f2aa2c72a75a6d20b6521ad8fcf9659d NetworkManager-wifi-1.40.16-15.el8_9.x86_64.rpm 93ecdf508147d0b081549133a71ed7f7a84240caa32ca3373a8dd8a13269ba4b NetworkManager-wwan-1.40.16-15.el8_9.x86_64.rpm ed422416d4b53e93ddf51a50af1ff3aef9271d3870e391aae0dd958845ab6fa5 RLBA-2024:1605 perl-HTTP-Tiny bug fix update HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl. Bug Fix(es): * perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl. Bug Fix(es): * perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793) rocky-linux-8-x86-64-baseos-rpms perl-HTTP-Tiny-0.074-2.el8_9.1.noarch.rpm 2a2106eb7e08a0bfd8a6daf5770cd4616b46dc037a2e5f569fedfc8922c84596 RLBA-2024:1606 util-linux bug fix update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es): * lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es): * lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562) rocky-linux-8-x86-64-baseos-rpms libblkid-2.32.1-44.el8_9.1.x86_64.rpm 75e36e64085e7ef1030f34cb77824e43c3980ff69d8a9447f4398a6d10a5f8c7 libblkid-devel-2.32.1-44.el8_9.1.x86_64.rpm d3ea95e9094c9dad5f3c9e52a0a2eafac2d4cae03b2e3f145ba5ce6b1172e807 libfdisk-2.32.1-44.el8_9.1.x86_64.rpm 3f9cf40332bb1f3636e5aafe19c2adb4a920f31124a8aa2df186fdc81a5e1255 libfdisk-devel-2.32.1-44.el8_9.1.x86_64.rpm 95ace0357b40f2f91f631baed0c648a54738a19975473243f6fa826e496eec41 libmount-2.32.1-44.el8_9.1.x86_64.rpm 09e47337447004b28c4bdf8e96c72930128b30a1b730aa05c36c85852ff00c21 libsmartcols-2.32.1-44.el8_9.1.x86_64.rpm 4ac9720b77ceea7c95d65ef2756240b04d6bcff5dc26971b2cd51c15b2546310 libsmartcols-devel-2.32.1-44.el8_9.1.x86_64.rpm 7f2b1bfb7d548e86626c314aa75576a4db786d5783dded08cce474b0409b6901 libuuid-2.32.1-44.el8_9.1.x86_64.rpm a1feb216c0b358b382ff1c3283741a82cf4c065a152058bf890118dc2ce103e8 libuuid-devel-2.32.1-44.el8_9.1.x86_64.rpm 18b0479bd96a5f7045b649f8e037a38fed5f96e619af9cc399540231c5382f71 util-linux-2.32.1-44.el8_9.1.x86_64.rpm e9938cc50d0923e2add2a538494e9d7d6a7bc6f9c302d8705a50b74b1f8f8452 util-linux-user-2.32.1-44.el8_9.1.x86_64.rpm b9aa2e15a4e2b81f04af9d7b9a2dd8a0f491a9e93830c9243a99a2f42dcfa37b uuidd-2.32.1-44.el8_9.1.x86_64.rpm 6d301026ed318849fd0980838bf5e00f93c75d4c865eb4e7a74aac81fb176f09 RLSA-2024:1607 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931) * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) Bug Fix(es): * OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010) * Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055) * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766) * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930) * rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479) * ceph: several cap and snap fixes (JIRA:Rocky Linux-20909) * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063) * unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719) * [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101) * kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954) * backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331) * ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496) Enhancement(s): * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931) * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) Bug Fix(es): * OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010) * Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055) * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766) * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930) * rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479) * ceph: several cap and snap fixes (JIRA:Rocky Linux-20909) * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063) * unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719) * [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101) * kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954) * backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331) * ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496) Enhancement(s): * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811) rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-513.24.1.el8_9.x86_64.rpm d4c3aa2b5cb6771de2282f947915ff82aa641a1cf2478581a9f9bd8af7820ed9 kernel-4.18.0-513.24.1.el8_9.x86_64.rpm 02ccdba68d5aaf2cf21d222efe4dd271df62ff682b3de81f49f4b4ceafb63efa kernel-abi-stablelists-4.18.0-513.24.1.el8_9.noarch.rpm 9dc4f48648f746ab7608ac9c020aaa0ba2c223bc5a53d56be0b1d2e25784e753 kernel-core-4.18.0-513.24.1.el8_9.x86_64.rpm 28241862f2cbc97ada16325e526c686a65cdcaa1ddac75e7cd4be45290b4f4d9 kernel-cross-headers-4.18.0-513.24.1.el8_9.x86_64.rpm 79c421cd229fc5728be38c237622e344cb4d4e690bd1ee2c425d190d8e7d8cdf kernel-debug-4.18.0-513.24.1.el8_9.x86_64.rpm 02bab9449a913729101739764d3391c0bb56e6b16d2f623c4a8748c9ec1af9da kernel-debug-core-4.18.0-513.24.1.el8_9.x86_64.rpm b34a032e2b0dcb9c0e7b032bffe5bcf00a76aceb1727d6d7a0feacf4e43fba32 kernel-debug-devel-4.18.0-513.24.1.el8_9.x86_64.rpm 0d8fb2c1644b7e46c48198d6b59af7f9c1e70059ba264be9fe5086e397f9d23e kernel-debuginfo-common-x86_64-4.18.0-513.24.1.el8_9.x86_64.rpm ba19285eb7930dc197c012f368ab070c9b48295b5e7e19e4c47367cbde48c79e kernel-debug-modules-4.18.0-513.24.1.el8_9.x86_64.rpm cca2de059383f24b5bb7c0803b63aa0327e950598ca79f90d3cf4d9a7ef8f6b4 kernel-debug-modules-extra-4.18.0-513.24.1.el8_9.x86_64.rpm f3b9cab2d7e6c9647e57d400e1ff6d01cffc5a5f5519809084dbcfd3435e1c22 kernel-devel-4.18.0-513.24.1.el8_9.x86_64.rpm 36a38a8fb290219442d34450e1e4b78d8b9819295f2d41d2fdf168c1adfcc15e kernel-doc-4.18.0-513.24.1.el8_9.noarch.rpm 0def6c11404ddde26d393bca3efa0981d5813ee1745c7e4a2b15c86c98b86937 kernel-headers-4.18.0-513.24.1.el8_9.x86_64.rpm 9e6b11688073157daa2b14868002d890f4adc3d6afe11e95cf3ee22d128c611a kernel-modules-4.18.0-513.24.1.el8_9.x86_64.rpm d93967af2c3647e0839ab50f0780c97fb3686268eaeffd7dda92c77966a9c533 kernel-modules-extra-4.18.0-513.24.1.el8_9.x86_64.rpm e33e30c9ed2c74979ba27686808a1b28d266971c15a56851c1777b447da305a1 kernel-tools-4.18.0-513.24.1.el8_9.x86_64.rpm 24f4146ec22f66c0885f93ab9b693b644f36ada46e900494f84a8c04fbaba23f kernel-tools-libs-4.18.0-513.24.1.el8_9.x86_64.rpm d737ad1b21a2c43c3f3cd1a9c08f5dc7cb7b0270b551e8834d906975bde5e7c0 perf-4.18.0-513.24.1.el8_9.x86_64.rpm b851bf91fb2a6ab4a19a866ed1e8241a9ee6765b034450a2fbd4c271cbab9c90 python3-perf-4.18.0-513.24.1.el8_9.x86_64.rpm fad3b87238e26daaef95060e4367aad5856760729b3c3664a61f61a436eaebc9 RLSA-2024:1608 Moderate: opencryptoki security update The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Security Fix(es): * opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Security Fix(es): * opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms opencryptoki-3.21.0-10.el8_9.x86_64.rpm 90cba074c678b9ea77314650012b8f9ffe11c0a3d895ac8e1c4fda4323d55c46 opencryptoki-icsftok-3.21.0-10.el8_9.x86_64.rpm a72b241eabe73089ecc2e68b50919f5edec77a24824d2104ff1e471318f97a25 opencryptoki-libs-3.21.0-10.el8_9.x86_64.rpm a1f9973f52e9c3ca03d6169408c96499c01eced26b4546efa1323f853c1b37b4 opencryptoki-swtok-3.21.0-10.el8_9.x86_64.rpm 559d3aaa09dae4d99fe6db8d8b022bed871d7802cb42a7a0e93cc7b93883012d opencryptoki-tpmtok-3.21.0-10.el8_9.x86_64.rpm f50f088d470ad128adabf15c4752d34236ac831947533fda3d2448e2c8fbad8c RLBA-2024:1609 python-pip bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449) rocky-linux-8-x86-64-baseos-rpms platform-python-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm 5fc0d2372285ab4b67ce22df0e339dc53f7cf961a7d4304f870a4d03c7719a74 python3-pip-wheel-9.0.3-23.el8_9.1.rocky.0.noarch.rpm c35cfde3728fbeb84e395247089088c87a9750091950213631435e86f86ec07d RLSA-2024:1610 Moderate: less security update The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors. Security Fix(es): * less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for less. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors. Security Fix(es): * less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms less-530-2.el8_9.x86_64.rpm dfdb3e447001de813ae20024990c3a434f8f76e96ba8ea3f14a86f833318e66c RLSA-2024:1615 Moderate: expat security update Expat is a C library for parsing XML documents. Security Fix(es): * expat: parsing large tokens can trigger a denial of service (CVE-2023-52425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: parsing large tokens can trigger a denial of service (CVE-2023-52425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms expat-2.2.5-11.el8_9.1.x86_64.rpm 9cb51fd81d64f5ca0e846689f45e447d445d58091fec8558e044f71cd74c2401 expat-devel-2.2.5-11.el8_9.1.x86_64.rpm 50e800064f774d3973414ad9996012bfb7f2c4cf5df983a4cc5600db706628a4 RLBA-2024:1739 sos bugfix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924) * Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331) * presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395) * The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665) * Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399) * fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924) * Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331) * presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395) * The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665) * Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399) * fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342) rocky-linux-8-x86-64-baseos-rpms sos-4.7.0-1.el8.noarch.rpm 021f3d73e9f1e3880d66db3b3e4d5ec3a86bf4895f050c942672c97b438dd2b4 sos-audit-4.7.0-1.el8.noarch.rpm 8e362a542e2317f6987396591278c1f33f9c987f0579b9392b0fd0c608e53796 RLSA-2024:1782 Important: bind and dhcp security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dhcp, bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms bind-export-devel-9.11.36-11.el8_9.1.x86_64.rpm c66537ce7400c499a576b548512e99ebcff413c50c2b9bbcff02e9cf2bfbb888 bind-export-libs-9.11.36-11.el8_9.1.x86_64.rpm 577947d4cfc79bb631bf1b0c4e9b085e83f0797709018bed189af646b21862a2 dhcp-client-4.3.6-49.el8_9.1.x86_64.rpm 79b3ca75904a2d842279b9abb00f22ebad11282548dcbfdb4c67fe24833270b3 dhcp-common-4.3.6-49.el8_9.1.noarch.rpm 1172e129dc346143f495e27267dca4e708fb70a055ae13dcdbaea140db37033e dhcp-libs-4.3.6-49.el8_9.1.x86_64.rpm 9bf7c84811668f6f5bf6a646ef0346711e6b9993f3bbbba7f91fe68d6fcde0a7 dhcp-relay-4.3.6-49.el8_9.1.x86_64.rpm 13083bf2ac3225b434cee8b9c23f8cc9045b13c0e4a2e6143c928b31eca0fc34 dhcp-server-4.3.6-49.el8_9.1.x86_64.rpm 7d98cfb9fe6a31b87c11365adb200e2047f859f853c65aad6e579224c21cc25a RLSA-2024:1784 Moderate: gnutls security update The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. This package update fixes a timing side-channel in deterministic ECDSA. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. This package update fixes a timing side-channel in deterministic ECDSA. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms gnutls-3.6.16-8.el8_9.3.x86_64.rpm 38d3c886f42444a732d015f89b6809a26b08c176529ae5051d5c4d30c19e16de RLSA-2024:2722 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms glibc-common-2.28-236.el8_9.13.x86_64.rpm 0717831be3893442ee3433f30ce9af15789b20a91ddbad0cefa3f76707365d59 glibc-langpack-anp-2.28-236.el8_9.13.x86_64.rpm 1b26c21071910c0ffe237c9b557c7c21ac02ef03237aafb59ebd48bd21c972f9 glibc-2.28-236.el8_9.13.x86_64.rpm b245492a8d830a9e2f8ee1a6d24333559bf80f885c511a7643749ce35045a1b0 glibc-all-langpacks-2.28-236.el8_9.13.x86_64.rpm 6b5d8154e5879cd6b72bb39ac155f01945e31ed0f24658077984c80569062691 glibc-devel-2.28-236.el8_9.13.x86_64.rpm f12426894a073245c0e159747edd2e43c062b1402bc6871dc8bdf6efbb564b4c glibc-doc-2.28-236.el8_9.13.noarch.rpm ce65550a6e53d9dfdef6627470f4adec0fee717f2339624386ebee7c95e5e5aa glibc-gconv-extra-2.28-236.el8_9.13.x86_64.rpm 4c71893e437e55c14020d6843a91cd33c0691c330fe9c7ce8991b839fd7b4137 glibc-headers-2.28-236.el8_9.13.x86_64.rpm 8169525314b2c212da60c3f10a7515debd883fef7e056070fbc6cc4ff63eaefc glibc-langpack-aa-2.28-236.el8_9.13.x86_64.rpm 3061f2cf074623fce3ed32a77b57369f56c30f75d9eb164f80c46077fbf6df47 glibc-langpack-af-2.28-236.el8_9.13.x86_64.rpm 7b29629781ccf57fc0eaf1701c0e7545f962adc572dd249ae5f4c05151fb81b3 glibc-langpack-agr-2.28-236.el8_9.13.x86_64.rpm b3542dc7b3adf6690b77dc10ebe4d3e83aa03f4aab762e41ec43d1c1fad91c10 glibc-langpack-ak-2.28-236.el8_9.13.x86_64.rpm 07d374354e18d97c2de26b7c9289c5a9e0bc990dce1c3b1a0e38c697b4738ff3 glibc-langpack-am-2.28-236.el8_9.13.x86_64.rpm b042f0c6244d7694e04ae692b89dcc58125d3da480b8ff67f723d8ac979b951b glibc-langpack-an-2.28-236.el8_9.13.x86_64.rpm a336b41fd692bff0dbf8cf8b655873acc0fa892f66b25e17568dcb92afada0a8 glibc-langpack-ar-2.28-236.el8_9.13.x86_64.rpm eb8e4636d30046a26297e105fbff0ab5065ff5da7b608a583059a3aa11970314 glibc-langpack-as-2.28-236.el8_9.13.x86_64.rpm 605fbdc6fd58a4f94e79fd04e7f2994d440ecc30d806714c9a6b2fc9d7e2c62f glibc-langpack-ast-2.28-236.el8_9.13.x86_64.rpm 8825df8ee4f7ba032a50e2a0e3242a8919a8704735e3b35a5d810a187ce27d09 glibc-langpack-ayc-2.28-236.el8_9.13.x86_64.rpm c42b64c4b7a794c09dea71d23a7b07e86f6fa64357d21e78a07e1090acb99508 glibc-langpack-az-2.28-236.el8_9.13.x86_64.rpm affaa2fddaf10dff40b052b45ab016d1560da04f4baaf09f5f5ad275f67eab39 glibc-langpack-be-2.28-236.el8_9.13.x86_64.rpm e31f217ca67be4474215e29d85d99b5299f0af0d6504719ba2a7324f76d49c90 glibc-langpack-bem-2.28-236.el8_9.13.x86_64.rpm 34d681b3d407e723179e4332c363d710614466dd6888c585894475bbea85faa4 glibc-langpack-ber-2.28-236.el8_9.13.x86_64.rpm f7bc51fd26157073c19468afe832e1b629af4766f66a824a626e2ff8fff5d143 glibc-langpack-bg-2.28-236.el8_9.13.x86_64.rpm 042682116c694951a734fd38a7cad5e6f537559a516a8b89eb9278f985d2809c glibc-langpack-bhb-2.28-236.el8_9.13.x86_64.rpm 2425bffda8178a163ec412bf41c110c53e950afa8656cd49a4ffac183ad71bbb glibc-langpack-bho-2.28-236.el8_9.13.x86_64.rpm 87ed6e8f960a7a4083fbfd88110750e260456d39f4b7f2fe15ada2c52a244940 glibc-langpack-bi-2.28-236.el8_9.13.x86_64.rpm 9d24c6225201642a5a2799df87a961cb9befac2a76c857222fedb788bad5367a glibc-langpack-bn-2.28-236.el8_9.13.x86_64.rpm 74411e3eb15346071a632cb857cd4b95d584f25d8d0329ff56febc86f3f1bb91 glibc-langpack-bo-2.28-236.el8_9.13.x86_64.rpm 303d1b0d7d93cd5a8d244e6e7d06fe5c5db5da547b6e346a919c0b9d3587d837 glibc-langpack-br-2.28-236.el8_9.13.x86_64.rpm e36d9652ab90b84346db8627deeff645ec1f5bdec57ce3a762738984ad503f80 glibc-langpack-brx-2.28-236.el8_9.13.x86_64.rpm 726750ff34dadef4c8f0d2627b36c5807271032c3eb744574ae694d35b0ce8a6 glibc-langpack-bs-2.28-236.el8_9.13.x86_64.rpm 629d6c6953344e5609985ad2d1fb4f83fd3c154eeb472a2bf3b2e292681a8a52 glibc-langpack-byn-2.28-236.el8_9.13.x86_64.rpm 5d5d6ca78fb98eb6ba054d7ec825cae9ac9018278f2c1e8ac1d5367cd6fd9d3b glibc-langpack-ca-2.28-236.el8_9.13.x86_64.rpm 5f51176badd28a076cd4c2233fc769e81991cebf8496b5338a3f5bdc2c8218d9 glibc-langpack-ce-2.28-236.el8_9.13.x86_64.rpm e25c7e85188d172bf559db02bc68407b3ee8f8789226373e5dbdceb90f9607d8 glibc-langpack-chr-2.28-236.el8_9.13.x86_64.rpm 6a2189bd20900c651532c4d0b319937ba8ab64f9d9152dd5f48bf658ae18aae4 glibc-langpack-cmn-2.28-236.el8_9.13.x86_64.rpm a90830fc9d0829cbe352464a8034aa3c573f0e6651abdb198e748aac63632773 glibc-langpack-crh-2.28-236.el8_9.13.x86_64.rpm d6d71dcead3cd207e72412c7d2f9e54d01b5cb0d8257f4d9907caac15e3affd2 glibc-langpack-cs-2.28-236.el8_9.13.x86_64.rpm 660801246e80aca515d0da9fa5ec29cfe7633a12f2271418ca18fab1dcb3d40d glibc-langpack-csb-2.28-236.el8_9.13.x86_64.rpm 2b77807cedd7e0d0a5644e370826fd4c2b25b4349a534494ce997a5dd4efd727 glibc-langpack-cv-2.28-236.el8_9.13.x86_64.rpm 231fddc7d10a7210d4314317fe2b2c3c1cca0e79dcca4066302ece745469e802 glibc-langpack-cy-2.28-236.el8_9.13.x86_64.rpm 302c950f955e745a68161e741df1cd919511f399f777fa71d8f9b87079fc9366 glibc-langpack-da-2.28-236.el8_9.13.x86_64.rpm fdd5f9335ad2f85153ba525e53b55f77ece7fa9b1caafc74bc209715d852f7e6 glibc-langpack-de-2.28-236.el8_9.13.x86_64.rpm 4d927007de849378428b094330adb9fdf97b07249a0841a0ce4e43064168444e glibc-langpack-doi-2.28-236.el8_9.13.x86_64.rpm 70a680e24c0f044837a1b8b488d3f8931d3672bd9d9abf8503a27604e98e210a glibc-langpack-dsb-2.28-236.el8_9.13.x86_64.rpm 2804bbd43583ab74430738ed7a2d95041262ae456cea8fa148e16281db0bb74c glibc-langpack-dv-2.28-236.el8_9.13.x86_64.rpm f67b7386bea0521fd974d01ec9fa5a0fd578c0c055a1b072707a26a76b19c135 glibc-langpack-dz-2.28-236.el8_9.13.x86_64.rpm ea4678e70c79b80bfd863448f0aef5ac63f1a195e81cf99535b618b5603ebc35 glibc-langpack-el-2.28-236.el8_9.13.x86_64.rpm def2bfe81cd98e090314fe2622b6589f4b73dd46ac5d486345d858e6948ef155 glibc-langpack-en-2.28-236.el8_9.13.x86_64.rpm 5ab7cab35edc471322659ffffd2419202fe2bf49f1335170f2696676eb0bc5a4 glibc-langpack-eo-2.28-236.el8_9.13.x86_64.rpm cebfcef26a0b5e4edcffd8104bb8be2a6509cd0b9fe42ff07da042c97234c1c0 glibc-langpack-es-2.28-236.el8_9.13.x86_64.rpm 4671e6cdfb9515f5de9bfca7e594fe2a1c17776080b09f688e83bf7e1a32c9d2 glibc-langpack-et-2.28-236.el8_9.13.x86_64.rpm 632807ab3092a421d87253cbe73aac53241bf58b10c0d1e4b2d6cfe29e2aa46f glibc-langpack-eu-2.28-236.el8_9.13.x86_64.rpm 905eeceb999fd56190a9ec431db041935a54047f169408b748f8d7da0c253059 glibc-langpack-fa-2.28-236.el8_9.13.x86_64.rpm e93832ccd520b69ca8da8adeee68479e6c505b0d3b6988a7cc13f9b876d0e592 glibc-langpack-ff-2.28-236.el8_9.13.x86_64.rpm 79d3020cff536877b09142498fbfe3ac59d23399269857cad868d8828efe228d glibc-langpack-fi-2.28-236.el8_9.13.x86_64.rpm 2a2212d77daecc03457a32e00d4f1161834fc3d4d322d57311870bd2bb96c185 glibc-langpack-fil-2.28-236.el8_9.13.x86_64.rpm 72b73e8fd9fbc82c7863db9ccc4a8995866486ee83f107cefdaaf153a4c45774 glibc-langpack-fo-2.28-236.el8_9.13.x86_64.rpm bab6a9c8d41de7455481a52ecb152c51238beded8ecf19d8d9742fbc109589cc glibc-langpack-fr-2.28-236.el8_9.13.x86_64.rpm ede31ce4bce93dfb756da12f3678f9f3ce8a7d871b29190b6fa1285b0bf5dd6d glibc-langpack-fur-2.28-236.el8_9.13.x86_64.rpm 235b309b0ed095ce9b3762f51ab3cbd5717cc59b7cce8bdb8860e7a0bdcc1bb3 glibc-langpack-fy-2.28-236.el8_9.13.x86_64.rpm 47097d76f050e8e3fb9e333346116a8a7291256ff1c2c0081fc6a814037ae301 glibc-langpack-ga-2.28-236.el8_9.13.x86_64.rpm 970802e3ec703883d153b3f99a89164456659d7b512824844fd17f8d1d237026 glibc-langpack-gd-2.28-236.el8_9.13.x86_64.rpm 62868ca1e5ee82b61a9beb7baf38d6e8a836b9190eaf6686ea80831bd692317c glibc-langpack-gez-2.28-236.el8_9.13.x86_64.rpm 763b936238ba0a18baa366a82ac10f14de88ed07b861c58924865995f88c58ef glibc-langpack-gl-2.28-236.el8_9.13.x86_64.rpm 01bbeff77fa444939b1ebe60d444c2321fd15190d2fa83eba46ed828381749d4 glibc-langpack-gu-2.28-236.el8_9.13.x86_64.rpm 812b6ed682f6fc38c693859743341980044a289343bfe6c0a6f2a38f56e0fda8 glibc-langpack-gv-2.28-236.el8_9.13.x86_64.rpm f9b18a274781bd4fc44bf1b9d671df85f0ebceade61932bc010224579cea0a5d glibc-langpack-ha-2.28-236.el8_9.13.x86_64.rpm 5b2567ac8c80ec90fd2bb032d8cb750f76e8b9cc945997c7005ace0b58bfe39f glibc-langpack-hak-2.28-236.el8_9.13.x86_64.rpm 4473b5cedac13e41e30b17e63750007696b2270b093330f2d1f1b379635f6239 glibc-langpack-he-2.28-236.el8_9.13.x86_64.rpm a6ea3ba828150ed9e63eabcf3b9b5528e4d854ccef1e837e07555c0fb25a2fc5 glibc-langpack-hi-2.28-236.el8_9.13.x86_64.rpm 2f73f03f5c267d87944a50a90edbce706065f5dbd70d8ae2902c76758d2c438c glibc-langpack-hif-2.28-236.el8_9.13.x86_64.rpm 9bdbfa7c56b33a30b196f067b790f1267dad85dbae666131066df62b70b256bd glibc-langpack-hne-2.28-236.el8_9.13.x86_64.rpm 3c113a570628db80e08a56f07af2daa7c2acf2e3558cc6755f046f631c55ed14 glibc-langpack-hr-2.28-236.el8_9.13.x86_64.rpm ba9503194d747e20609661d8b31a0d7ee2a621dbec6cb72c48e3d6a5173092a8 glibc-langpack-hsb-2.28-236.el8_9.13.x86_64.rpm 8060a9a6dcdd47f95b8be46d0f37637729b4eada0d1aeea6b3442d53b98bc6c8 glibc-langpack-ht-2.28-236.el8_9.13.x86_64.rpm a2d8134cf64f33b3ef101019381108eab554f53d7fa42ecae20d6f8b0c2b2518 glibc-langpack-hu-2.28-236.el8_9.13.x86_64.rpm d857986a3e051850b1b73bc2978774b678eaa4588d3c23ced0433a6e620a987c glibc-langpack-hy-2.28-236.el8_9.13.x86_64.rpm bffded529eca35060712443c52ca8dc38dcdd2bcfd9d47422b0969460dc53a09 glibc-langpack-ia-2.28-236.el8_9.13.x86_64.rpm 6a09fecc9f250bc6b1e5a7fda241e283fac934c322b518e2a353de837e7aa7a2 glibc-langpack-id-2.28-236.el8_9.13.x86_64.rpm c39f5bc8e07616e8f08c2f3efcbe8172b42aadf4dd2e9bb583be4127f087181e glibc-langpack-ig-2.28-236.el8_9.13.x86_64.rpm 0c6843536730adf98819d9a81818de6fd2dfee7ab58fe3324133f52aa7b5a192 glibc-langpack-ik-2.28-236.el8_9.13.x86_64.rpm 06cfb73b562de6e536e34432b0a2c017c06448280bac3b5f8e28aa76972e09a0 glibc-langpack-is-2.28-236.el8_9.13.x86_64.rpm 5e8bda3b8dd916d2579eb476c66aa66df9ad978a19081bedbd9394e8db712835 glibc-langpack-it-2.28-236.el8_9.13.x86_64.rpm 092e6cdca651a790d7c6e67b13e40c9ba987b39ae38e6eae14a7825c93bbbd5c glibc-langpack-iu-2.28-236.el8_9.13.x86_64.rpm 3146c25cedce5442392e7062be9a720efd830d5afc8865b1ee12a85405071627 glibc-langpack-ja-2.28-236.el8_9.13.x86_64.rpm 20133066711b33c324b2c462dc50124484dec2be3facf978de1dae136a159f11 glibc-langpack-ka-2.28-236.el8_9.13.x86_64.rpm 922e8c9ebe8ec58ec3ce3d8807d9ff2fad87ebd64c55bc428b0c702d0fc1092a glibc-langpack-kab-2.28-236.el8_9.13.x86_64.rpm d7ce564f426df7f397ec2bf076675da130f3cc8a4cef9c978d3a542cc1dd51c4 glibc-langpack-kk-2.28-236.el8_9.13.x86_64.rpm c7d64d86d962ed793fe464c44a8a3e3f98c35f93b7fbc977bb713081c42c10c0 glibc-langpack-kl-2.28-236.el8_9.13.x86_64.rpm af2049d54061eb124e18b6a4214cdb3eaf993052bb77ff20aece46d30b1fa9b3 glibc-langpack-km-2.28-236.el8_9.13.x86_64.rpm 8f03bd1cbd1a7b1f9edc65f3f5ddca7654f127c2eff46237d1a2b437c24fb8bf glibc-langpack-kn-2.28-236.el8_9.13.x86_64.rpm 02114135d2eb946bc642c02a640c4901b803d08c8261db8c8deb33433013be7e glibc-langpack-ko-2.28-236.el8_9.13.x86_64.rpm 36505c88f532e91c4ce49923b9ab1c1f2f904849a1a90e3afa194d24346fdc32 glibc-langpack-kok-2.28-236.el8_9.13.x86_64.rpm 9ff846f8f5a0a4388be3202775cbafa02797da77aa5c098b4bd2ccba6de20295 glibc-langpack-ks-2.28-236.el8_9.13.x86_64.rpm 6b7c9b63f2d8fd7bc5dada8eced13e0d6afc238dc9e2b63d2c2047cdd9d86f83 glibc-langpack-ku-2.28-236.el8_9.13.x86_64.rpm 37bd6537a5fde7f8edf94ce6389a249c9cb36d296cdc5271d3b50c4b73b4d448 glibc-langpack-kw-2.28-236.el8_9.13.x86_64.rpm 8a7fe4175ca0eb2bed91fb156e5122b7300f5bccb2ea474f16587ec95273c7ea glibc-langpack-ky-2.28-236.el8_9.13.x86_64.rpm d854cad27a22b3d15c2d875612ace7ccfd54d3d684b083d6673a3917b3d60de5 glibc-langpack-lb-2.28-236.el8_9.13.x86_64.rpm 31528fa50063ccd429f832edbba60e2f1904c8a72564bfc72964c177651226be glibc-langpack-lg-2.28-236.el8_9.13.x86_64.rpm 28462e92b552c88224a04541a182490a692288253dcb0ec6eddfc77448338527 glibc-langpack-li-2.28-236.el8_9.13.x86_64.rpm 7b54eb4c035417fefa528c675d30e3b89bc9fb46e9e978073a97787b8ecde715 glibc-langpack-lij-2.28-236.el8_9.13.x86_64.rpm 83194ee2041411219ad57bb618ce5363510db18ce9f03d8f978048ee6d275e9a glibc-langpack-ln-2.28-236.el8_9.13.x86_64.rpm 62564bff52f80743e5464da68b788f853f94d4dcdc4b5ceb1b1766c5ec848a4c glibc-langpack-lo-2.28-236.el8_9.13.x86_64.rpm b76061944ed61d44e72a5a2b73f773f8ab0d4c1cab16330017e418495a489825 glibc-langpack-lt-2.28-236.el8_9.13.x86_64.rpm 0891358ed038492f916c391745c01f52d9840e2a436c06ba92b9cfda4bd29e1c glibc-langpack-lv-2.28-236.el8_9.13.x86_64.rpm ff6b1dc7497b4e63044ee643a8d513fdb166734102ddbc0c7f9f1a3353553be3 glibc-langpack-lzh-2.28-236.el8_9.13.x86_64.rpm 2ff0c287f82bb63fa05cf9ed2953f5b76b6967e5236c405d9972174a68962d64 glibc-langpack-mag-2.28-236.el8_9.13.x86_64.rpm bb6048af20dfecc54ffd521ec9978cb7d64eb7815d32cdef4e839899e7024430 glibc-langpack-mai-2.28-236.el8_9.13.x86_64.rpm 040eadc84f69ad5f1f370b1b7cd55cf74b323ed544a93b26528606f3224db7ff glibc-langpack-mfe-2.28-236.el8_9.13.x86_64.rpm 6662b756c90a6141031068ce8e55636cec1b51fa73fe2ec67868b56be6eb2020 glibc-langpack-mg-2.28-236.el8_9.13.x86_64.rpm ce07f4d5563120a7d602b738e3ad12420de65ae7a6af05bcfcef2fae18ef9fa5 glibc-langpack-mhr-2.28-236.el8_9.13.x86_64.rpm ccce85db48c55a5621e6bc5d93e1f9997f1960b531fd8fe700684238b8488e48 glibc-langpack-mi-2.28-236.el8_9.13.x86_64.rpm 6fa9b7507de6b6fcc8e45b3a6d88850e82c2df15494dd1b4b2816fab852a5362 glibc-langpack-miq-2.28-236.el8_9.13.x86_64.rpm bb98aa37c28a68192b7452bbe1ee69c2f7b7e5167da9b9c735cee522bd8c2873 glibc-langpack-mjw-2.28-236.el8_9.13.x86_64.rpm 9adb4d57e1e8b2429f5edf89e665759aa49c979fa7bbe131b2e0dcb023cf7fdf glibc-langpack-mk-2.28-236.el8_9.13.x86_64.rpm 74d2341a6363e8aede6a6bea500b1b06379a761490ff40709be35d987a249afa glibc-langpack-ml-2.28-236.el8_9.13.x86_64.rpm b4d7645dfd98e329283c7b75c36ed0a09292ca2bf938f6c9f26fa35fcf2710c9 glibc-langpack-mn-2.28-236.el8_9.13.x86_64.rpm c1d64fbb61e5f644763f40360e552c04a91e23cd9b30edc3e000b2ca75939f67 glibc-langpack-mni-2.28-236.el8_9.13.x86_64.rpm aa6bf16aa7a414cabfb6647b47c1ed3dd9c6ce3751f3f99288346d92bbf8afe7 glibc-langpack-mr-2.28-236.el8_9.13.x86_64.rpm c65c09fdf7516240079052ea11028ce0a0f8bddea328766d71c383a1bf419a28 glibc-langpack-ms-2.28-236.el8_9.13.x86_64.rpm 5fed3d39f68a1bc6b5727ab89d38f29c08b813da71b0f8f81cc1221a686aa4de glibc-langpack-mt-2.28-236.el8_9.13.x86_64.rpm 4d5a83d6fa6f915980e4277abea7df136e08d405a3de20f4aa3b83e42b855faa glibc-langpack-my-2.28-236.el8_9.13.x86_64.rpm 82f1daad723ce02745414096be10c157bb6c0d766e0655c5fea0b1690e77c628 glibc-langpack-nan-2.28-236.el8_9.13.x86_64.rpm d514fd60445f66291115e5686f1a0abe7df109e97cc4b83fa5e1e6d0d8025920 glibc-langpack-nb-2.28-236.el8_9.13.x86_64.rpm 9d9514a59e5e8dec6b7d05daaff39325584c477db04cadada23613e6acd01592 glibc-langpack-nds-2.28-236.el8_9.13.x86_64.rpm 59ef4c3b500711238b84e1f4ec2ff58a3cdf773d14ace3579245e0d2f8faf8b1 glibc-langpack-ne-2.28-236.el8_9.13.x86_64.rpm e6f432c57e64ca82ab46ebe1d4348ca62de1184bf9208c5f621dc786497003d2 glibc-langpack-nhn-2.28-236.el8_9.13.x86_64.rpm 96d1c902ed6fbd509d3fc3b76ed4db6bec659b2591347a341eb62652599e81f9 glibc-langpack-niu-2.28-236.el8_9.13.x86_64.rpm e392882214641e7feca970a1d79984c2ab1f9764f6203e584ac23e88234b54be glibc-langpack-nl-2.28-236.el8_9.13.x86_64.rpm 6b430f0bf24ab9d23a35dd6dd7e7c9bee80dbfe8ff5893ad9079ac6975919715 glibc-langpack-nn-2.28-236.el8_9.13.x86_64.rpm b62719dff997216d93e335902d8e1c1c7d4d59a1ec76c62282d7580fde876780 glibc-langpack-nr-2.28-236.el8_9.13.x86_64.rpm 8d08154d995e18260fe5c7921caf923eb3d31da1f6232dd1901ea376bdb200e8 glibc-langpack-nso-2.28-236.el8_9.13.x86_64.rpm 8a2d37c674a164349cf26adc592567938571f1b6a58df62e8b2e0988d8145dd3 glibc-langpack-oc-2.28-236.el8_9.13.x86_64.rpm 7b6d420666ecbf9aa6ab6de34da1ae40ae0b740043c9e0b0b0301392318be0dd glibc-langpack-om-2.28-236.el8_9.13.x86_64.rpm e2ae157221cf4b2ece1fced16b040677b130a04361ef2134200b9a5520ecbae8 glibc-langpack-or-2.28-236.el8_9.13.x86_64.rpm 445cf2c678918e691279c83df9a384af79adcf228850b13d3997338274847a1c glibc-langpack-os-2.28-236.el8_9.13.x86_64.rpm 4c71a50d824111483b202ebb0d42ee2c8c3dbeb549c7ec10daf0bef56eef025a glibc-langpack-pa-2.28-236.el8_9.13.x86_64.rpm a6e344b48b774a44cbfd29fb5318dd947cd5260d80295a393f59afce3299f66f glibc-langpack-pap-2.28-236.el8_9.13.x86_64.rpm 3416997ff8dbc523e26ff89434b82316cd7521a595ec6790071f6ad2335fc0c6 glibc-langpack-pl-2.28-236.el8_9.13.x86_64.rpm aea9c8750c8ef9cdc5dad501ee73ba63cd4357073296cc8fd9a9bbcb598e18ae glibc-langpack-ps-2.28-236.el8_9.13.x86_64.rpm be4d60e3aef5b89ec5c563eb5bdffeaf76a456eda8803944335ca5ad692b6324 glibc-langpack-pt-2.28-236.el8_9.13.x86_64.rpm 1c7e49b6f971786dcce5113e85cedb7febb6b42ae4cfb34cc0cbd0f41e3bbe77 glibc-langpack-quz-2.28-236.el8_9.13.x86_64.rpm c0271122a788d78a293f287daf4478fb56014c225ba84437f67a6f3eee494785 glibc-langpack-raj-2.28-236.el8_9.13.x86_64.rpm 379e7b1006e601d8722ea7f231b8df86e7c48974e9506de57ce98c8e28630ccb glibc-langpack-ro-2.28-236.el8_9.13.x86_64.rpm 3f3c08c589f89387d6342d96d8d09388ecde4271a8d59969b7866cadb6546499 glibc-langpack-ru-2.28-236.el8_9.13.x86_64.rpm c52954ea432e61e103a16393d3814a50d40d46f1281bc1f0b4746a8ec793c637 glibc-langpack-rw-2.28-236.el8_9.13.x86_64.rpm da5d3cbc1e3fb76c42c6839c86a6f9d5507ffb6fbd3cba2acd3b2a3e8da23627 glibc-langpack-sa-2.28-236.el8_9.13.x86_64.rpm 25bba3d36f660bc9bc8bf2197add8192c393d82b9af3abe8bd893cc12bdcb58e glibc-langpack-sah-2.28-236.el8_9.13.x86_64.rpm 996ec994d8d8acbcaff860b83fdc2ef407af94ddccba7e6569a7e79db49bf250 glibc-langpack-sat-2.28-236.el8_9.13.x86_64.rpm 83302a490282225ae6b0b95b725e20e8f92e9de339a14e6c58985f9e4804ba18 glibc-langpack-sc-2.28-236.el8_9.13.x86_64.rpm eeb841ceb91290ad04f04b85f1292ac3b6a0dbdb032aabf65d6e72371148a5b5 glibc-langpack-sd-2.28-236.el8_9.13.x86_64.rpm 1543ddca865ce626ac04c87b0d357614072fb72f08775daa04591a3c59b8a67d glibc-langpack-se-2.28-236.el8_9.13.x86_64.rpm 1cf9f4af244dbf66f21e28b3bb208b09581708583e9c312a72ce50aeee571714 glibc-langpack-sgs-2.28-236.el8_9.13.x86_64.rpm e245a57d09fbeb8e47e0556464c4bc571cea558269faa4d65d666cf3ac469f6f glibc-langpack-shn-2.28-236.el8_9.13.x86_64.rpm 86d3ea6aa840d554097c928d773c71c89cc7014dc9d6f05d9fb3f53b4a28e881 glibc-langpack-shs-2.28-236.el8_9.13.x86_64.rpm fd75b8cb8e3cb5d2c627254a23ce68d231da45f8fed01eaf1052b33edf88b7c4 glibc-langpack-si-2.28-236.el8_9.13.x86_64.rpm 0261a15ba0c7d7c67b7c46f3b971f5587be35a0b60c7cff36fdcc175f257df38 glibc-langpack-sid-2.28-236.el8_9.13.x86_64.rpm d2f239225178bcbdfb8fa5e7d56221e3b382f853caa115ad07532a4a1b9f2401 glibc-langpack-sk-2.28-236.el8_9.13.x86_64.rpm 617decd78d2c674b0fe5eac8641f97fe41f1a97d334e519fda1f0df05187db0f glibc-langpack-sl-2.28-236.el8_9.13.x86_64.rpm 917687a15d5a93408d08232da1388712cc32ca74b1d63e59b83b95471f86d3e4 glibc-langpack-sm-2.28-236.el8_9.13.x86_64.rpm ae920408c496f721f10713bdafe79145644a303335e63634ddb6c5ce3957f165 glibc-langpack-so-2.28-236.el8_9.13.x86_64.rpm c915b576495d9a0cb360c6c842972b92888cf38943e6aa7ae234f5be60f92b33 glibc-langpack-sq-2.28-236.el8_9.13.x86_64.rpm b22b2be0e81b207281e30a4f6615c8eb410594b4ee6a745873ac730dac2e9895 glibc-langpack-sr-2.28-236.el8_9.13.x86_64.rpm 366746c852cba45f2668c899fc7d8ea7302e50f021110dc2ef860248c04934da glibc-langpack-ss-2.28-236.el8_9.13.x86_64.rpm f65f816b46c9a184abf9386131494f924735d5b6fd0221dcf3f47ed12cc10abe glibc-langpack-st-2.28-236.el8_9.13.x86_64.rpm 5e5ec253aa258ea0d6e2de35378250156e413273ad07baab886734ca2b0530a8 glibc-langpack-sv-2.28-236.el8_9.13.x86_64.rpm 3965b20dce86abc5c2705ed7453afb6180eea80869979406e8cbb769e93dd1ae glibc-langpack-sw-2.28-236.el8_9.13.x86_64.rpm 8a2333168b8bbcb8b766804b01e5121450418f4da4325d2e6bb9f01b7832d291 glibc-langpack-szl-2.28-236.el8_9.13.x86_64.rpm 026ff0ad625dee5bb1c125f4deac588d392e503c5bc869685bd79d4614eefd7e glibc-langpack-ta-2.28-236.el8_9.13.x86_64.rpm 030caaae9959f73e83fc256ac480834d88b42cc8932c7ce88c63487fc5289c24 glibc-langpack-tcy-2.28-236.el8_9.13.x86_64.rpm c9e27adc9557e316d4e03af5abcfa8655d4c5f07dc51279a2ce74e8645e09f62 glibc-langpack-te-2.28-236.el8_9.13.x86_64.rpm 9b0031e8d620a38e97f4b78f9287d204d381d267052a84dd41ae978bff3364cb glibc-langpack-tg-2.28-236.el8_9.13.x86_64.rpm 10515e760b09d187d7c626f7527e829e8689dc2697a894ad6e2058e967d3683a glibc-langpack-th-2.28-236.el8_9.13.x86_64.rpm 03bf3205b4237300d4c3e3d15abc90f37810c010fcf67332fb14430d0047959f glibc-langpack-the-2.28-236.el8_9.13.x86_64.rpm 137a03ef7ec0a88c47aa7b6f76acf30632fc927156f052df9a9a0691c2bab382 glibc-langpack-ti-2.28-236.el8_9.13.x86_64.rpm cdf67071ce7ab36b4144b57caa746776a2d13237aaf89d1f951621b65606b6d5 glibc-langpack-tig-2.28-236.el8_9.13.x86_64.rpm 546b0774b05ce1802af9856f5d8fcee8f8d519defddc3bf72ff80f0edcdeb593 glibc-langpack-tk-2.28-236.el8_9.13.x86_64.rpm f7cf59dece07e630fa5a09e0572d1570c1281aaf3f4f3090bcc67ff92e1ea908 glibc-langpack-tl-2.28-236.el8_9.13.x86_64.rpm 7e10ca3c0d982f46366f3a7b918b886eea6472b7674874f5ab8afc8b64aec49e glibc-langpack-tn-2.28-236.el8_9.13.x86_64.rpm 08b13b9353f3fdeac8f8ae4d816e8f21b4a48c0de3b9a3c91847c87d2234294d glibc-langpack-to-2.28-236.el8_9.13.x86_64.rpm 57add976b7d582430e61ad43c2114f03c98918c9f1db65afb896d2a127f03031 glibc-langpack-tpi-2.28-236.el8_9.13.x86_64.rpm c70380eda8845e327a7c66a8e718873ccda2dc08af6433c03e902f43ed1e9ed8 glibc-langpack-tr-2.28-236.el8_9.13.x86_64.rpm 72e2f88d516349872c28234bc087ea025018579b2e6762fdfd12d10b452e6ad9 glibc-langpack-ts-2.28-236.el8_9.13.x86_64.rpm d6c316469c3267d15c645de00b3b3cacbd892071ca27d92050820b44834a1363 glibc-langpack-tt-2.28-236.el8_9.13.x86_64.rpm 43a44beb877e6f6082f7818df022b08c74c36a2d7ca5300161253448e199c72e glibc-langpack-ug-2.28-236.el8_9.13.x86_64.rpm 373a6723e7f4db02bb76cae83df78edb9d846982137e33b06d479ec026c1ef89 glibc-langpack-uk-2.28-236.el8_9.13.x86_64.rpm f8ad07a5d975150f27fe2ac72ba4d1eed7ce2abe19d5018a73dd182652e035de glibc-langpack-unm-2.28-236.el8_9.13.x86_64.rpm e5a2fd459269035512c63652210a39584f9779c178b24cf32ecde0653b362fe6 glibc-langpack-ur-2.28-236.el8_9.13.x86_64.rpm 99f91e0bffde017fe5c58f48d380cafde42e403136414dacb7c67c6c2b37f232 glibc-langpack-uz-2.28-236.el8_9.13.x86_64.rpm 75088e9f35c584871b9c0be0768c3d75d467873112aee3dcaca8bd5b8d6aec4b glibc-langpack-ve-2.28-236.el8_9.13.x86_64.rpm f3a18793bcbf94fcb3d2f15ea47b928c07676081e9a49043ce8105fa704d388b glibc-langpack-vi-2.28-236.el8_9.13.x86_64.rpm df75d81a96dc79200e7742cf7e4c01c7dc29b8f3401cb8b0c343e6d3f19b7fcb glibc-langpack-wa-2.28-236.el8_9.13.x86_64.rpm 8fbc9ccf973660158c0edc8ef6cfe330204f1fe4f3310c9da0684d012fedb862 glibc-langpack-wae-2.28-236.el8_9.13.x86_64.rpm 958966a7fd749058e2a54b46ca2e978dd220ece5d04742d75c61a41abdf16017 glibc-langpack-wal-2.28-236.el8_9.13.x86_64.rpm 49017c18b0dd4845dd08cfaa5cfca378a48fc39dcde885ca23f545f0702f74c8 glibc-langpack-wo-2.28-236.el8_9.13.x86_64.rpm d467deda914184ce458d6d001043c65c5d56d775b390fd191e3654f2e67b1e8c glibc-langpack-xh-2.28-236.el8_9.13.x86_64.rpm d21f8c44d898d1df8d32ab52e58cadb09d6d6c760e642fe8071b26c5ccbb3e1f glibc-langpack-yi-2.28-236.el8_9.13.x86_64.rpm eee54a5be79eaa45387e9a662ecde6779a325afa4638b7499e568fc2db6979a3 glibc-langpack-yo-2.28-236.el8_9.13.x86_64.rpm 93cf46095cfe009ae5b3c878e46476580c22ecf938d69500da954c491c2b423d glibc-langpack-yue-2.28-236.el8_9.13.x86_64.rpm 63f545f6cfe69e220d86c3ab826155776a31b4c87794b85b5e44fe686fdc4fde glibc-langpack-yuw-2.28-236.el8_9.13.x86_64.rpm 057d990fb47c81641901028fd3d6382241ff1bd80e6a2758817b6e82c5513b43 glibc-langpack-zh-2.28-236.el8_9.13.x86_64.rpm 8bb2a8472e28f2a54e166b48f4bc6df4b84b6cde3d7a9068ea47dccc22e58d03 glibc-langpack-zu-2.28-236.el8_9.13.x86_64.rpm d64b62299ece755a66d8e35382457c1ce96a946aa96be271ba49723c34dafcec glibc-locale-source-2.28-236.el8_9.13.x86_64.rpm 02e80032c741cb712301b811717c60a505277162144adacfea082c6d4cdc3e86 glibc-minimal-langpack-2.28-236.el8_9.13.x86_64.rpm f022542ecba747dcf3bb77eb1be7fcb10de98fa53f0e3cd0eee26cbc4cbc0b69 libnsl-2.28-236.el8_9.13.x86_64.rpm a1cfaeeea4bd49bfa7011f951cfce157046d1e17da4adfb0bdc144a89fed8051 nscd-2.28-236.el8_9.13.x86_64.rpm a3849b50e239b101f7b58f38c81689534eb89694c12ab1e4cbb8843a9560542b nss_db-2.28-236.el8_9.13.x86_64.rpm a9295073b1fbfa55b4a8c976a82f28bdc13a4717990dd112ff612aaf9da82ac1 RLBA-2019:3778 hwdata bug fix update Bug Fix(es): * Pull PCI/USB IDs for 8.1.0.z (BZ#1767717) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * Pull PCI/USB IDs for 8.1.0.z (BZ#1767717) rocky-linux-8-x86-64-baseos-rpms hwdata-0.314-8.22.el8.noarch.rpm 08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69 RLBA-2024:1602 nftables bug fix update nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * nftables counter (JIRA:Rocky Linux-2596) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * nftables counter (JIRA:Rocky Linux-2596) rocky-linux-8-x86-64-baseos-rpms nftables-1.0.4-4.el8.x86_64.rpm 5d6d61c1319ab8464e5f2f739cf1d06aa777cef25147fec64e6359ffd63de913 python3-nftables-1.0.4-4.el8.x86_64.rpm 617132927c4ef0244f34fce882a95fc89ec14cf6195354d0de7570840aed4d45 RLBA-2024:1603 iptables bug fix update The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es): * ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350) * New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es): * ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350) * New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654) rocky-linux-8-x86-64-baseos-rpms iptables-1.8.5-11.el8.x86_64.rpm fdb50c8f3f5e6e412de4aad0bd0ad80cc83b16eba7564539438e844379140553 iptables-arptables-1.8.5-11.el8.x86_64.rpm 7350d4e1036f858de69fe807e431a924b7120e0cf0f91a3903d6b516bb61af11 iptables-devel-1.8.5-11.el8.x86_64.rpm 165c169cf0e3f53f2935cbdba2d091d5440eed47c9493148d692b8af49bbf230 iptables-ebtables-1.8.5-11.el8.x86_64.rpm 843755dcce2d76edfb1ecac2ee18e50c523f2de9e4f2723d0925975d001e37d8 iptables-libs-1.8.5-11.el8.x86_64.rpm a377b20131a9a962d4832390c54c5e4901d71fd9dbc5a87c4c94129cbd95d1c7 iptables-services-1.8.5-11.el8.x86_64.rpm cbff9551af131bdcdc16f37f374478ad42d8f98ad44fce4ae85d7bdec1260213 iptables-utils-1.8.5-11.el8.x86_64.rpm f4e3710af660e958a79c2f473a439409889170f9e237bff79cbf6f477f595a70 RLBA-2024:3136 libsoup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libsoup-2.62.3-5.el8.x86_64.rpm 886459733d2e4eb826c7d88be8ae35d83980d45fa3b6031d105797e83f5e8308 RLBA-2024:3142 numactl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms numactl-2.0.16-4.el8.x86_64.rpm cd75e2e9d59e1d464b40ae6c3ab9cf6cd159231dbecb6efede7ae4db62480a4a numactl-devel-2.0.16-4.el8.x86_64.rpm 445a1887b9c4ac80bd8bb654d32c266e3809767e862e6450124f5010d03b16c5 numactl-libs-2.0.16-4.el8.x86_64.rpm 08d156324fa101363d0559c9558d3df70e25b7033170ada0c5bfca9608a94fd6 RLBA-2024:3140 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms kexec-tools-2.0.26-14.el8.x86_64.rpm 22188ccf09e91ff1f5d96c67a44054b252b6878718411cc4324bd11cae265dfb RLBA-2024:3141 c-ares bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms c-ares-1.13.0-10.el8.x86_64.rpm 445b151877a4d8cfc25b3207b207be15cddb452cf3c6964526e275a018dbc12b c-ares-devel-1.13.0-10.el8.x86_64.rpm 80b2752fd37e51a07f19b6c39584236cead5fbd7e07f71033f9828020f9f6deb RLBA-2024:3137 libtracefs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtracefs-1.3.1-3.el8.x86_64.rpm c9a3f81883dc8f92eb930fa35cd71f6186ff4ea6d88b0912aa6e099d60373a94 RLSA-2024:3139 Moderate: squashfs-tools security update SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems. Security Fix(es): * squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153) * squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squashfs-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems. Security Fix(es): * squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153) * squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms squashfs-tools-4.3-21.el8.x86_64.rpm 590e7d25b06d6838f680a9381911f859ff36104da9c522179a169f6528f03b94 RLSA-2024:3138 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-553.el8_10.x86_64.rpm 1c31c30d1f10e9c122cd45a4d07f5e80d5abd372ad7c5116fe9ef1cf0aaa9730 kernel-4.18.0-553.el8_10.x86_64.rpm 67e494f803fffb643c81cbfadcdc6978065c16d81e72b22206e0a8f8baaf4456 kernel-abi-stablelists-4.18.0-553.el8_10.noarch.rpm 4a654bf1f356dc3c1db0c813b00868d3d3f3dc5633e85ffe6507aec53c3652a8 kernel-core-4.18.0-553.el8_10.x86_64.rpm b8c3e03882cc219c69392acd3badd8df5f0cef327f539f06ddebfe01d41a1fc6 kernel-cross-headers-4.18.0-553.el8_10.x86_64.rpm 4a8162648a73f870905191360f7b75ebe4bb0bf7ba15ce1d4b677410fb8be44a kernel-debug-4.18.0-553.el8_10.x86_64.rpm ebb8dcd1a61691e2f5688035d3776076f4faaf5705f8ecea2b88eaf5d31d006f kernel-debug-core-4.18.0-553.el8_10.x86_64.rpm a912a135204d7214b67ef3ff3f6c26a4c8a325547c2ddebf7d2290725cf5cc71 kernel-debug-devel-4.18.0-553.el8_10.x86_64.rpm 8be7e9c7cc1f3ebec82d2a4b4b02c0b508a6bfd430e83aa4f898d33e93c8b53c kernel-debuginfo-common-x86_64-4.18.0-553.el8_10.x86_64.rpm 25a70156deeb2f58d48ff2215e0baa5f9738a686e48be5172a7f54684d539a50 kernel-debug-modules-4.18.0-553.el8_10.x86_64.rpm 01405d5c347819ede6142a0bc3cf966fc41d5b816f6e2e31ecdbe0ef45999a27 kernel-debug-modules-extra-4.18.0-553.el8_10.x86_64.rpm 1ec0b3630abff7bd7649aeec81ae11dfa741e2c070b7d82e7052f90b19f77d3c kernel-devel-4.18.0-553.el8_10.x86_64.rpm 269c046c07549943137d6a6d6316a0f217eb7d2c229e8a32972a915a50060e6c kernel-doc-4.18.0-553.el8_10.noarch.rpm 2b50aa89af6bc25639ebd05ec71ac66e0bc9f5b550f8173e4dbdf278084d8292 kernel-headers-4.18.0-553.el8_10.x86_64.rpm 63c006d4afd10c77e0505b01bbef7cd1aa7f4250dac9abc84edc4c7ba71445f0 kernel-modules-4.18.0-553.el8_10.x86_64.rpm 1303a1948bfc61d71b1826f052feb1dc9cd3bdf9b1b5f24c8e5365ff9032f5be kernel-modules-extra-4.18.0-553.el8_10.x86_64.rpm dc20a5ce0d99514409ec5e28de30ad492032745e9765b9dc317353b0cb763fd8 kernel-tools-4.18.0-553.el8_10.x86_64.rpm c5ad1795a8c00cd888e4119c52831892f931012c95424cc6e3af5a8e867d7fc2 kernel-tools-libs-4.18.0-553.el8_10.x86_64.rpm 2782734ac038af61d45a469895422c7982b8239cde56f3fa93ce253f7059a9bf perf-4.18.0-553.el8_10.x86_64.rpm 67c3d582a6c873e5f8d889e4903176e4e0c708c502bc030ccf70b79f7c905c76 python3-perf-4.18.0-553.el8_10.x86_64.rpm ea354037627efd887adb7bd8faad98dd0c445557026f1a2b573b11c4e4f71929 RLBA-2024:3152 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms glibc-2.28-251.el8_10.2.x86_64.rpm 5f9dee73acb40bc44f9e30c9798549fe58aa76aed614a844187b5075e4db4304 glibc-all-langpacks-2.28-251.el8_10.2.x86_64.rpm 2b7dfafee58b2672940b0e4ddaaf319f5797a06ed407a8c1f28e8420a065badb glibc-common-2.28-251.el8_10.2.x86_64.rpm 51acbbeb9f97dbc9afeae0f8fe51f5e41c91ef33441a5a1d31410638c34fa657 glibc-devel-2.28-251.el8_10.2.x86_64.rpm 93c3eac9db417548298b90449dc69be3410136d8ccef59ffa996ad690ebd2b16 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-gconv-extra-2.28-251.el8_10.2.x86_64.rpm 890e73820ba5355f7d55020f63fe11d3dde628eaf4227dee344f2c3b6e857e5a glibc-headers-2.28-251.el8_10.2.x86_64.rpm 7d6743a8dbbea1181218ef247608124d77dee6cac82031bb7fe3ec4f5e04a28a glibc-langpack-aa-2.28-251.el8_10.2.x86_64.rpm 678bc555973e19d3ea769af140a21f0a7576458dc02c48a3b64ed72da1dd7e32 glibc-langpack-af-2.28-251.el8_10.2.x86_64.rpm 00c1d27d1a5749eea68a51e0f67602496fa5f3f442b85f6a1a826a6c46f64807 glibc-langpack-agr-2.28-251.el8_10.2.x86_64.rpm 7d575d87e04d8f22de7daf7824efb5d1163d5f0fccaddd10975736df9b76d878 glibc-langpack-ak-2.28-251.el8_10.2.x86_64.rpm 731d5b965205efb67eb1e48b7e76b84202c88874e2cdad1d66f66a8fbc497a2e glibc-langpack-am-2.28-251.el8_10.2.x86_64.rpm 358d6731c5b4dbd2764782afb3cd7ff56a6854d700e8d6a985c93f6732f73f66 glibc-langpack-an-2.28-251.el8_10.2.x86_64.rpm 69954eb1ffb5fe5db98e053287b3c013ea88948eb7da52c8d11675b849c919cf glibc-langpack-anp-2.28-251.el8_10.2.x86_64.rpm 7e429c3e27157fa104f7186f9b103117d48dc325cff420f2a7a490eda09f9064 glibc-langpack-ar-2.28-251.el8_10.2.x86_64.rpm 4cdcd6389a4b7a0c102b44787846eba902740f90d1eb93b771045c2f76f36063 glibc-langpack-as-2.28-251.el8_10.2.x86_64.rpm 22dd94c0ad3bba6f082d1519c25af6e81494751e11c9699cdca083bc20a2ad51 glibc-langpack-ast-2.28-251.el8_10.2.x86_64.rpm 792a7394d99296b91ea7f57eca97c2677708022e25be9a7c449e7ed44ab98472 glibc-langpack-ayc-2.28-251.el8_10.2.x86_64.rpm e5e2695a09b5ddd925caff590df6d514920c30e5ba0b513bc2ee549b0f8910ec glibc-langpack-az-2.28-251.el8_10.2.x86_64.rpm c8d7fb8b1c43ed290cdf420627db251fa9aaf10bf737676aadf7d76bb02ca7b0 glibc-langpack-be-2.28-251.el8_10.2.x86_64.rpm 82386a29f77623edb58f17e8e205eab173dd83d0efbdf10dcc724f18a142a46c glibc-langpack-bem-2.28-251.el8_10.2.x86_64.rpm 03cf8e781a5715aa80dc6d7a124f83267baf70b47066f1a63b50c2792fe147be glibc-langpack-ber-2.28-251.el8_10.2.x86_64.rpm 073287b7918809d1d3c68f8c973aba66f535c93e5d46ca183399d4f679b7a7df glibc-langpack-bg-2.28-251.el8_10.2.x86_64.rpm 8635f78096f91103fe6ff0e76791477ae615fda3947b9cdec41d01b418fac802 glibc-langpack-bhb-2.28-251.el8_10.2.x86_64.rpm 2dfde722f24cd75029ffd26bba8223a330224849985ef2ec3318d6629793ad24 glibc-langpack-bho-2.28-251.el8_10.2.x86_64.rpm d0be0055537fa1ac40d80b887a49323d8319669912589e6f4aa2b2d1f1f80823 glibc-langpack-bi-2.28-251.el8_10.2.x86_64.rpm d7af1f7358f59daa54cb63c026d155d089af7002bff539e8338428a577910a50 glibc-langpack-bn-2.28-251.el8_10.2.x86_64.rpm e71c0edab89074f318267dd37591fef8fa8d7d30236db5fc1642b8b591066ff2 glibc-langpack-bo-2.28-251.el8_10.2.x86_64.rpm 0c379783e6d387f8590f339d799288a8fb67b08d9493ae2616ebb3297b1fe8ac glibc-langpack-br-2.28-251.el8_10.2.x86_64.rpm 31c0c28bd287ebbc4b5d4d1fbb1d302cd9a471161717efc6fc3b01a7664287d9 glibc-langpack-brx-2.28-251.el8_10.2.x86_64.rpm c568de193c0807af757d835d91a988a89e44b3e04bef73a82073d5934727979e glibc-langpack-bs-2.28-251.el8_10.2.x86_64.rpm f543df498a7e63c8f8b55025aaa8b3b3aa0af098eeeb49fa151e899be622f5a0 glibc-langpack-byn-2.28-251.el8_10.2.x86_64.rpm f8fce0af3e0eb179f7341420495a18749d2443c9e8c11aae500d1e5ed70224f4 glibc-langpack-ca-2.28-251.el8_10.2.x86_64.rpm 745ba708a40f5a93d603a60fb50fc194f4fcd115fb4df2df10b5b6a638293c58 glibc-langpack-ce-2.28-251.el8_10.2.x86_64.rpm 59aad0c3adbaca6433df9e570b0f3bf5206592abb8a2fdf006e4407f952563b6 glibc-langpack-chr-2.28-251.el8_10.2.x86_64.rpm 67201e83a0ade666dc3c35f8de0ac8a8b7cff06820533a7840b62a282f08f7f9 glibc-langpack-cmn-2.28-251.el8_10.2.x86_64.rpm 976dcbb8cb8c547ffa0eaaae09e5f6e126748900d29a46f9e34a4073fb7c19ab glibc-langpack-crh-2.28-251.el8_10.2.x86_64.rpm d41a8e229513b1648336206fdfcae7fa14b37aaa35157ddc21f6e2fb56c7e74b glibc-langpack-cs-2.28-251.el8_10.2.x86_64.rpm e0ad588a5059b295dc0b0db39289392b8c4b0bf989dc535f63cec515923795d0 glibc-langpack-csb-2.28-251.el8_10.2.x86_64.rpm 079c408e016d0af342385c701fa580640254847378955ae2b64b42eea579adbd glibc-langpack-cv-2.28-251.el8_10.2.x86_64.rpm 6924b4bf9edfad8bb713820e79b5ae6b7d430fe33fc45970b7d7757e3279c108 glibc-langpack-cy-2.28-251.el8_10.2.x86_64.rpm 7ae8033e698f778a161eadf9ccfa3824667b8937aa6599320229288171d412cc glibc-langpack-da-2.28-251.el8_10.2.x86_64.rpm 12fddd526e7c4b62bbb30080fd2717d33e2a8039d44618a652f7623db4b438b6 glibc-langpack-de-2.28-251.el8_10.2.x86_64.rpm 1c2f533771c3be155b96e49458e3d693283c714a26a9adbdc2f83fa7fe50495d glibc-langpack-doi-2.28-251.el8_10.2.x86_64.rpm e45c09f4b6721fa3315f5d8cbfa0ecc1a50fe02b1c32a0a71f9ed4b32e865693 glibc-langpack-dsb-2.28-251.el8_10.2.x86_64.rpm 3221219511d9ac4cb4972bb02d0a7bc0a93b1356db0dd9c4c00e91bc8fcfd682 glibc-langpack-dv-2.28-251.el8_10.2.x86_64.rpm a0cfc8bc067cc623dc27f017e991bf6c31faca8f72ec42afbd0b3e4c0af184f6 glibc-langpack-dz-2.28-251.el8_10.2.x86_64.rpm 6b3ceaf5682dbe292ca517f0bf9ff783b6c8724555a6bf00e2794c54ec2c70b9 glibc-langpack-el-2.28-251.el8_10.2.x86_64.rpm 28ed38e7008b49ea51ae74cc8d32d6f7dde6bd1b40dcde55e6f7785e901c595c glibc-langpack-en-2.28-251.el8_10.2.x86_64.rpm 2d15d11ef45e5ae103a7948524f6b4e1d72fc4c161e375078ff3e501526aecf2 glibc-langpack-eo-2.28-251.el8_10.2.x86_64.rpm 43745e09ad545ce9f092b3f07c5402640d7bc11a28739d914e01685740d9a19b glibc-langpack-es-2.28-251.el8_10.2.x86_64.rpm 507f3944dc331feba8d74073fff597dc504c4bb849cb585bb8dc50b946fddb85 glibc-langpack-et-2.28-251.el8_10.2.x86_64.rpm 095ec54ceb7c017acf18b54b8b609beccc6d3944801f4fc20b928550cc08b450 glibc-langpack-eu-2.28-251.el8_10.2.x86_64.rpm 02aa6f19a5f096e8ddc4a722e9987f1168e6a8d7f4b42b63eae647ca835b1986 glibc-langpack-fa-2.28-251.el8_10.2.x86_64.rpm 26ef1cfa3bb7f6fad5e1088a725d6cb5c538ab9e006d7560980a9ae6b0ec8438 glibc-langpack-ff-2.28-251.el8_10.2.x86_64.rpm fa21c2030dfa13ee5e30f48487e0486f981d1340c45463eb27644296334d39f4 glibc-langpack-fi-2.28-251.el8_10.2.x86_64.rpm 8c26534ea2ecb803528fac360d1294be94de958453ea863dd672dacb996bdabb glibc-langpack-fil-2.28-251.el8_10.2.x86_64.rpm c57e1b144c9b970b7d28a90446c14b533cb61f2bc3ea19844a3970300b55a74b glibc-langpack-fo-2.28-251.el8_10.2.x86_64.rpm 383cb74c20f5e1cdcecbe5725dfe78323f7748e246b63e054a0cbc9580bcc5ad glibc-langpack-fr-2.28-251.el8_10.2.x86_64.rpm a79b4b5505b207a61cd8fa563d0c394e526dcaf6f177d03bd3efaeaf75f72440 glibc-langpack-fur-2.28-251.el8_10.2.x86_64.rpm b023bb3b1192a392df3af3ac7c34e325f45e7b762d74ef6e155761bbca182513 glibc-langpack-fy-2.28-251.el8_10.2.x86_64.rpm e9b37a499075c3f497f5fe468434be09988b78bd7bb1275be33438058f719487 glibc-langpack-ga-2.28-251.el8_10.2.x86_64.rpm 8f79881c318edc8d8426dab4952afa71fa0ee913334523c6a138019d18050e7a glibc-langpack-gd-2.28-251.el8_10.2.x86_64.rpm ddb954464578a1ab08c11839fdc87729b64e77d98825972610c5b5c8258ba757 glibc-langpack-gez-2.28-251.el8_10.2.x86_64.rpm bf61c5ed8af642d9c80d12b812eb28d9cbaccf646b8258bc1dff077728718ad6 glibc-langpack-gl-2.28-251.el8_10.2.x86_64.rpm 1f0b879a2c932a69dae68f2afa3fad4b86edf0e9bd20d89e6b4b1fd1b7700c8f glibc-langpack-gu-2.28-251.el8_10.2.x86_64.rpm 369146fec93a8a699df6b6e7d88cabdb991583120372beafe5516423c4033cc8 glibc-langpack-gv-2.28-251.el8_10.2.x86_64.rpm d87bbfd46e3a837e15f72b3145d67312e4ffae9ff02df42bdbed293ba5cdf33c glibc-langpack-ha-2.28-251.el8_10.2.x86_64.rpm bb8a77700d4f63b38c9f1cfa03c3eb266d14bdb4983e00297c1a6eba7e78e085 glibc-langpack-hak-2.28-251.el8_10.2.x86_64.rpm 028a64ab550a554f13f2d4e7d5a48ea42e2f49e30062fd71c7d61e5e0df44cd9 glibc-langpack-he-2.28-251.el8_10.2.x86_64.rpm 924332927be6eb3123f138b46eda5d4e75f3813e6628612e9f374f8e3576d5d0 glibc-langpack-hi-2.28-251.el8_10.2.x86_64.rpm 28f9b191b3b92423a451692415347392719f05b940be94a63ed1ccf82c0a113e glibc-langpack-hif-2.28-251.el8_10.2.x86_64.rpm 4ac49b39ed556f2dc105bcf9fc70dda391d188367959da36dd041ff51e35f5a1 glibc-langpack-hne-2.28-251.el8_10.2.x86_64.rpm fe41b322e41f6325fd333c603dbbf2eb145749682632f826da3a427e1c429461 glibc-langpack-hr-2.28-251.el8_10.2.x86_64.rpm 549f4fe7a53b40b3db020cce43ea4f690b9095ceaabb91e45da9d029aa5061a2 glibc-langpack-hsb-2.28-251.el8_10.2.x86_64.rpm f8ec8fe3247b2f76e8dcc84adb53921bf18b188c4a5255e308ca5c0c4b2938c3 glibc-langpack-ht-2.28-251.el8_10.2.x86_64.rpm d76573de02f63b3cfd96219b403fe3a9bc2ebe797fc9b30d3e5f70ee157fe32f glibc-langpack-hu-2.28-251.el8_10.2.x86_64.rpm 791f4e4d1bf95ac28599dfa0842bb0630b99365eecd72f11ce49adb9ed848d17 glibc-langpack-hy-2.28-251.el8_10.2.x86_64.rpm 3e9faa93e76752b1d0244b39b902053e449a1f5b483bfca04a29b367b0eed21b glibc-langpack-ia-2.28-251.el8_10.2.x86_64.rpm 427a67943c925935bf9ffb426883377be8b729e6f9e6475208e8887d998c0379 glibc-langpack-id-2.28-251.el8_10.2.x86_64.rpm 48dd4063c79eca75c2f9a711ca45c836b9711cc1be2c2a5f376ea25b19dc7ef7 glibc-langpack-ig-2.28-251.el8_10.2.x86_64.rpm 5420ec348dcee5c18d891dbdcd01c7d2f40688cffb683451b28f94c575925a3e glibc-langpack-ik-2.28-251.el8_10.2.x86_64.rpm 8f934a1b52b23274a0c853329d472e5b77a5f817cea22a1c9efd39355f15a573 glibc-langpack-is-2.28-251.el8_10.2.x86_64.rpm 1ae21ae2d5b2168231ad17fdfbc08b0aa86ad723fb8b82c08112a742e1651989 glibc-langpack-it-2.28-251.el8_10.2.x86_64.rpm bce92f3ce30bbaf64a75164925a72e36389189e33d24fd3dfb06ca676eb73a05 glibc-langpack-iu-2.28-251.el8_10.2.x86_64.rpm 71957c7cc4ea58595ac87d27580b648f86763cc3dee3b91734cc64ac1f99d615 glibc-langpack-ja-2.28-251.el8_10.2.x86_64.rpm a6b35ef657575f0a61514151fda570f57d8350b151bdde6068453366367a1e48 glibc-langpack-ka-2.28-251.el8_10.2.x86_64.rpm 147b685b5a179f7a4b603d8b9f69f3c88f4c6b843e969981dc6e4e4b4dc5c4b0 glibc-langpack-kab-2.28-251.el8_10.2.x86_64.rpm 74e142ad4472575466c86360fbf98cab1a29667320fb45bc7ed2296fadc3df6f glibc-langpack-kk-2.28-251.el8_10.2.x86_64.rpm c065f705098b0a3ce5d55a8fa124d11d8bd427f8bb31385bf141334d5c5e943d glibc-langpack-kl-2.28-251.el8_10.2.x86_64.rpm b9981fbb4a6665c60f39c8d89b88644f2c9e8f6ad77f9e634cd19e7d523853e8 glibc-langpack-km-2.28-251.el8_10.2.x86_64.rpm 1f33abafceb005944e31668ccc3cc544398d90a2db773a04ebd143a9484c428a glibc-langpack-kn-2.28-251.el8_10.2.x86_64.rpm 0493e45cbd6a68e333280e2b1c348a19c98d4e28c07f51062b620c60aa52d8ae glibc-langpack-ko-2.28-251.el8_10.2.x86_64.rpm e7542e277eb757c903478e7068cd46d097ed1446ae58a9f9e885f66d5d389c0b glibc-langpack-kok-2.28-251.el8_10.2.x86_64.rpm d8cd920473e775b6e38b0777cdad67529b57ddec011218ed8c57285427c68b99 glibc-langpack-ks-2.28-251.el8_10.2.x86_64.rpm 768eb82bece5f0f9533c00e8be8a4a4c460045d2383c9a07536d1230fabde4a7 glibc-langpack-ku-2.28-251.el8_10.2.x86_64.rpm d35d19485a25a327253ecbf5f418e20657062f4c8140e3ef3735a482c276ff3f glibc-langpack-kw-2.28-251.el8_10.2.x86_64.rpm 0d3248dfa96b3d88a43086819dc84cb4379cda8a37f770914e905c075ee4b2e5 glibc-langpack-ky-2.28-251.el8_10.2.x86_64.rpm bdb1ed35128dd6a2fc990940ed0dcae5540f292a3250eb23c01b684b2dd0e907 glibc-langpack-lb-2.28-251.el8_10.2.x86_64.rpm 9d05032ac9c74261cd90944f02365803b97bf04306ec829ca1fe55547a6687af glibc-langpack-lg-2.28-251.el8_10.2.x86_64.rpm 908b6d437e06bf9ec8cae71481b76cdcb40749ed20d81dbe8077d71ecd0ce8e5 glibc-langpack-li-2.28-251.el8_10.2.x86_64.rpm 5a615049259be94a6246a29cfbf60dbce5af334a291cca2793dae1ac43ee11b8 glibc-langpack-lij-2.28-251.el8_10.2.x86_64.rpm 2220b48243ffc0a49abf8642794f8a80640632b7ced4b8f4aea4d0618578afb2 glibc-langpack-ln-2.28-251.el8_10.2.x86_64.rpm 28758e4fc60ba8f68e0201fa1057224d6edc80b37e53b73c956859da08a2c800 glibc-langpack-lo-2.28-251.el8_10.2.x86_64.rpm 68e4d975e599253241f04d8508ed822e4301d355a7fcd95ceea90227b35f5600 glibc-langpack-lt-2.28-251.el8_10.2.x86_64.rpm b6e01840a3ec6c9cbd2b42acf3328f76b16851abd5668ef6d08ed70e6e28e27e glibc-langpack-lv-2.28-251.el8_10.2.x86_64.rpm 23a80868f5904e8a5a42f5b60f5bc6de5e8776a13a58b286242a35f8b4daf2b0 glibc-langpack-lzh-2.28-251.el8_10.2.x86_64.rpm 8173e2480d780004e440c9d8b0934f3c170a9798b9d002ab19361d6b0b2f7144 glibc-langpack-mag-2.28-251.el8_10.2.x86_64.rpm 33d91e0b6e075cc5d51c7c1070d6c477e058f481b9a3db4fa359aabe6ed6f1de glibc-langpack-mai-2.28-251.el8_10.2.x86_64.rpm ae10f7b683c3e62248e9d9ea5b9b2b7a704886e1c807223f62f67e71605f5809 glibc-langpack-mfe-2.28-251.el8_10.2.x86_64.rpm 2e4fc18ac17c9f1689fba44dbb41aadc8af1bc37b4ef807e9a9f9dd4fce865bb glibc-langpack-mg-2.28-251.el8_10.2.x86_64.rpm 950d1e478a3607869b6dfbd588a5bdbdf9dce443bc916f3e9a1338f00067e482 glibc-langpack-mhr-2.28-251.el8_10.2.x86_64.rpm aac7bd2bfc6caf7185ba1873caed149ceeffd5a88eb95ec5a6afba1e10131edf glibc-langpack-mi-2.28-251.el8_10.2.x86_64.rpm af890640054113ecb1df7854eebff20077fcaf6acc6408e79de92a74d1377672 glibc-langpack-miq-2.28-251.el8_10.2.x86_64.rpm bd491484308b3a1c098888de25cdb8f96f29221c45abd462a0616f1245cf3a45 glibc-langpack-mjw-2.28-251.el8_10.2.x86_64.rpm b86fdbe41d7966607aad754e19d044f9fec3b28a0f6c439958856ffebe7e26b0 glibc-langpack-mk-2.28-251.el8_10.2.x86_64.rpm 43471447f330f092544c2fd1e11536369a700dadee7ff3bf0824cdeb66354b26 glibc-langpack-ml-2.28-251.el8_10.2.x86_64.rpm 5dcac47b2ca52d9f1ca08aa3ff55eb1524365ddfcb1390a356470eac3963cf71 glibc-langpack-mn-2.28-251.el8_10.2.x86_64.rpm b1b20399368b8bb11c26de6e29a0c5b990be5d4c68e20ff12095b00e1b3f886b glibc-langpack-mni-2.28-251.el8_10.2.x86_64.rpm b175b810548d2bad4dbcd951e75363c24dfc1a36da7399d09f80a873f5514402 glibc-langpack-mr-2.28-251.el8_10.2.x86_64.rpm d0a50ded1e2a03c8db17e6a3c83bb642f0e36d6d052465ed0b8f4aafdbcf0cf6 glibc-langpack-ms-2.28-251.el8_10.2.x86_64.rpm e5012c8946248d344ac414ccf22cdfc0086face7c295d0550eda4bb87d91de49 glibc-langpack-mt-2.28-251.el8_10.2.x86_64.rpm 747aae2236f92e24e11dc0662cc289bfc826fa5fbdbe57bae811ed27ff525106 glibc-langpack-my-2.28-251.el8_10.2.x86_64.rpm 7296d88c18ac9dc14a0773e4bfcb09039170661047b5058e852eb13bee31c392 glibc-langpack-nan-2.28-251.el8_10.2.x86_64.rpm 705dfb5c56df42f641db33559cf7eaa871986c198b84b975d2656adada02c771 glibc-langpack-nb-2.28-251.el8_10.2.x86_64.rpm 7527c8dd4e8f8202525b8f69c32c234152d779311278beaea60b8ae0cb9d4e27 glibc-langpack-nds-2.28-251.el8_10.2.x86_64.rpm 295b9a3eae9f74a63cc09a68c0ca5bf866ca78612d8cd106b619d24560d65932 glibc-langpack-ne-2.28-251.el8_10.2.x86_64.rpm 4ceaf4ba8f06752c9fb33a16054589d08838bfca9568c29056799d2ef48d29dd glibc-langpack-nhn-2.28-251.el8_10.2.x86_64.rpm 0ccae1034dd3394c31e5033dbeea15d414f2c07bbf47f2586c1faf9941c0a64f glibc-langpack-niu-2.28-251.el8_10.2.x86_64.rpm cb506ea508e9968608a08f6bc5538cad4914971a42dd53600c129796867923e3 glibc-langpack-nl-2.28-251.el8_10.2.x86_64.rpm b4fc5a8c24652b6670e5d3f4fc0b721de4ca99979efc4101775bb75acd683277 glibc-langpack-nn-2.28-251.el8_10.2.x86_64.rpm 28e75248ab4d44967378052d7f0da6da0ba786dfc81248c93a034d2a44b9cd5b glibc-langpack-nr-2.28-251.el8_10.2.x86_64.rpm d23b7a51a276159f15bc561b5568b0bc74add4ac784a9dfd16ef7c8ca4b0dac4 glibc-langpack-nso-2.28-251.el8_10.2.x86_64.rpm 781f4c439a106d3de8afba100e4cbb0b03116e14edd249d9ebc6a0d30cc81b9a glibc-langpack-oc-2.28-251.el8_10.2.x86_64.rpm bbdd72bf1dd2900e66b026ee7dda7282e32fee9e42960e5f3098fa2af22f658b glibc-langpack-om-2.28-251.el8_10.2.x86_64.rpm 46f273d10c54a975804a977a3602d6d9dc49e7a11c44b3cee8cf68ed9e8a0294 glibc-langpack-or-2.28-251.el8_10.2.x86_64.rpm 5ab828d0723654fe62457a52ed057d9de53b111cf0146dc411c2be822815cfec glibc-langpack-os-2.28-251.el8_10.2.x86_64.rpm c423ae35666d1280e8873492fad823eb0c146f528090e59987b40b28392a3531 glibc-langpack-pa-2.28-251.el8_10.2.x86_64.rpm 8c13af6c2019bc154aa7679a599171812fe72e18db51e159504772228147d472 glibc-langpack-pap-2.28-251.el8_10.2.x86_64.rpm c9d37e8b81880578fdf608730daa29a687fe8f66e6e2519a3d38ae6776a6fcc9 glibc-langpack-pl-2.28-251.el8_10.2.x86_64.rpm a98cc53b07a295c4583a78456bae37805117ba2b123a748c90b5b06e1c5452f4 glibc-langpack-ps-2.28-251.el8_10.2.x86_64.rpm 4b1093e6b97cb5d52931ad525cd6694b178f2e6c11d35208240c6a9bd6b02ca4 glibc-langpack-pt-2.28-251.el8_10.2.x86_64.rpm 011e482a92769ed7d041fc53d0ab9bf282a7b4892d56281fc3cc66aee5155edc glibc-langpack-quz-2.28-251.el8_10.2.x86_64.rpm e773879e393de3e44eccc55c92634557fddc85d4d69006e4b53a573df1223116 glibc-langpack-raj-2.28-251.el8_10.2.x86_64.rpm 8b762be9b70dcc76596d64c5959df48e66acdc21eccd05a0ab0736c614f46132 glibc-langpack-ro-2.28-251.el8_10.2.x86_64.rpm c47a02e24700a7f94b7364a23d86b1214b56ebd2f77f74348f95ea11ae3a8777 glibc-langpack-ru-2.28-251.el8_10.2.x86_64.rpm 3396b099397b6b5bdc6437275f95359a842c60806606ae7146687c18ab813342 glibc-langpack-rw-2.28-251.el8_10.2.x86_64.rpm d8ac12464cd4489adfbd0a794068f4af607738e94011f9b8da606f2bdac2ed56 glibc-langpack-sa-2.28-251.el8_10.2.x86_64.rpm d70ac66e8bddde59b4994554d41a885d037333c188ad7b99a2f3a388ec32be1e glibc-langpack-sah-2.28-251.el8_10.2.x86_64.rpm 3d32ae6eb8a62b770ccffac7cdbf35bf28dbd109c0d377f2623a040dc041afe8 glibc-langpack-sat-2.28-251.el8_10.2.x86_64.rpm 2c133dd023815b8c8d2d6583a94cb1095e1113a3ffb6156f4d4ecedee4fb1e13 glibc-langpack-sc-2.28-251.el8_10.2.x86_64.rpm 4cd1c112acb51acff3f9def497dabdf51576c542321a8ee1d9c30e4da3f08a4f glibc-langpack-sd-2.28-251.el8_10.2.x86_64.rpm 05d1b601387c54908d417c435b4ae51e294eac8b5ac0fc0c7087a7fae4f766ea glibc-langpack-se-2.28-251.el8_10.2.x86_64.rpm e92ed74284674a50b700bcf5e6cb01b0d65559e43f3930d2152149e7b161ce62 glibc-langpack-sgs-2.28-251.el8_10.2.x86_64.rpm c38cf7e2973e3853fb6399fbd350f79e886dae2809c02dbdc3361644bf58421d glibc-langpack-shn-2.28-251.el8_10.2.x86_64.rpm d673a586e4b58cacde8334b4e6a76eb47682181f834c8c0d28a3707d53356b12 glibc-langpack-shs-2.28-251.el8_10.2.x86_64.rpm db693e329a857f455666d50df5a4b9de37a89126da8eb57af0d40b4c58ab9450 glibc-langpack-si-2.28-251.el8_10.2.x86_64.rpm f7b33c8c4f2a4cf6997da629f9914ccb3648440a836f04c46b1ba93dcc3ac179 glibc-langpack-sid-2.28-251.el8_10.2.x86_64.rpm d9aba5d855e06fb4dc36686085aefa78b3fd4a9c93056fdd6dd7075b69101488 glibc-langpack-sk-2.28-251.el8_10.2.x86_64.rpm 8c5e06362fc0eaabfc5471faae972c2a529c8f0ecdb9d990de4c8a55e948f121 glibc-langpack-sl-2.28-251.el8_10.2.x86_64.rpm ab104744522496c3de9ca19e8de5ad83bb42b62e13a05f7a3551c1615d3b858e glibc-langpack-sm-2.28-251.el8_10.2.x86_64.rpm c02ea9b2c9be0e6147d85316575e9f3431992de58850c556e0fb4e2acde662f9 glibc-langpack-so-2.28-251.el8_10.2.x86_64.rpm 29215a4a5e972a549301f0bc220b886e3df90c09302820198e01e94b9f6b4be0 glibc-langpack-sq-2.28-251.el8_10.2.x86_64.rpm 62c500e321ab48620d8adaa0bca22deb1de0e0714b7e9578261c1acadfce46aa glibc-langpack-sr-2.28-251.el8_10.2.x86_64.rpm deea0caaeb473645b5d271a396d93be600993e9a7a08a3701a0a3441c46e0117 glibc-langpack-ss-2.28-251.el8_10.2.x86_64.rpm 537059d5672e5eac8f3da47b65fffdb09adce3a4722d027bbdc29d3f4ce95687 glibc-langpack-st-2.28-251.el8_10.2.x86_64.rpm aee36035bde544c10eb8e76a70a7f7b35071827eb6ced0a2b8d9d1a157c1d4f5 glibc-langpack-sv-2.28-251.el8_10.2.x86_64.rpm 8521e9fbaa659cbec4ba16807bb8d2390016a6db6b412163f5b404bf8113eae6 glibc-langpack-sw-2.28-251.el8_10.2.x86_64.rpm 630948481031095547ccc8350f4f1d5c637e548981eae0c21069de1b17af7255 glibc-langpack-szl-2.28-251.el8_10.2.x86_64.rpm f071a52d156069b162b9aaddf515c6811ef36192d11b48d87df62b4f6f4912bc glibc-langpack-ta-2.28-251.el8_10.2.x86_64.rpm 1d2c33dc8bae67ac2c92a635165b4f58f3ec1f60fa5ab6e3f23c0f3f7626df3a glibc-langpack-tcy-2.28-251.el8_10.2.x86_64.rpm 66de27da791d3cd480a6a4e2a502bec8e5d19ec24070681129dc5d67b4add03b glibc-langpack-te-2.28-251.el8_10.2.x86_64.rpm 00a0baee255c77d91758370b7b4b5287334ca66234ef7d16f4687b86723cbb1c glibc-langpack-tg-2.28-251.el8_10.2.x86_64.rpm a50b77000337ed72da1264b1c161c5ceb74807511cac386aa3dfa314e194780d glibc-langpack-th-2.28-251.el8_10.2.x86_64.rpm f0529acbed431c935e36c46e7f14d769ff4c804e1d9e8f7acd5eb526cc5a891e glibc-langpack-the-2.28-251.el8_10.2.x86_64.rpm 1517674368390397f426f0ea3c67fd7a8b251e79131b93d034f60739b30eb315 glibc-langpack-ti-2.28-251.el8_10.2.x86_64.rpm 25dc398ef197302d27eadf28d6339752ea8bb6ed237f71fcca8e03f335af294b glibc-langpack-tig-2.28-251.el8_10.2.x86_64.rpm 77b0c9e8df2fd1b7cdd85fe0271064940d0711f097edbf057d1c6b1e09127ff0 glibc-langpack-tk-2.28-251.el8_10.2.x86_64.rpm 10319835967e2381b17bb23f132cd09df070aff64b6ccf42c3e1511a346474c0 glibc-langpack-tl-2.28-251.el8_10.2.x86_64.rpm e633cb27568417dea243f96fce7531acb2a057e5eb461cb5c589e493181fb609 glibc-langpack-tn-2.28-251.el8_10.2.x86_64.rpm f14e289acb068e8fb14afe956b665e7a78efedc3c3a79390b7af72570aec69b5 glibc-langpack-to-2.28-251.el8_10.2.x86_64.rpm 4c303c213849884535e6b24d3a5944b52b16f505325520eb01870848907532eb glibc-langpack-tpi-2.28-251.el8_10.2.x86_64.rpm f07271a40f66f69a5c0b9bddbdae234b16044bfa42413e5497d62b24d330732e glibc-langpack-tr-2.28-251.el8_10.2.x86_64.rpm 4f9f044d198b92e22e7aae0d90f4f65d2b5417a9271b7517bb7e3674363eb79f glibc-langpack-ts-2.28-251.el8_10.2.x86_64.rpm 0a9fba890241d5b086f896cdaa8bc0f2d0dc1da87caa812b2664a84f130e45cf glibc-langpack-tt-2.28-251.el8_10.2.x86_64.rpm f9c99dc8fa89d297fdec0ae9b5d60602fa65271883c15382e270c240d6a0c13e glibc-langpack-ug-2.28-251.el8_10.2.x86_64.rpm cd11199feb747051a9ea0aeeb2629262ef1f965b8915686edf2973b69593f793 glibc-langpack-uk-2.28-251.el8_10.2.x86_64.rpm 92f51fabd69cf01d3b696b78388944263cd9f2fd6d5062b1f16db67c5b5ae94c glibc-langpack-unm-2.28-251.el8_10.2.x86_64.rpm fabeb82cba4a63dff23e3a7e1083c3372843fa2e4fb2534cdc6a2c8e90822b8f glibc-langpack-ur-2.28-251.el8_10.2.x86_64.rpm af9f61592cdeb78896cf3e95c20d7eea922b8d092c725532b44dfbc7ee582529 glibc-langpack-uz-2.28-251.el8_10.2.x86_64.rpm 50dfea55cab019da3dc21168467a19ab6d1b8d976c0e220a3da929299808550a glibc-langpack-ve-2.28-251.el8_10.2.x86_64.rpm 12b6e812b0c0c796f3f8ff8194a9df5677664da25c19163591153844a72290b5 glibc-langpack-vi-2.28-251.el8_10.2.x86_64.rpm 20146d89efcf2a36e21fef1e628ddb0cd2ff33082b07259bad40a7db3fae3392 glibc-langpack-wa-2.28-251.el8_10.2.x86_64.rpm f2ee3a8091f0189a52546dc5cadc1cb1efc899f543a787955ba1733395444752 glibc-langpack-wae-2.28-251.el8_10.2.x86_64.rpm 946d7b57c6e4f7f4e3ae73fc20376596fc94b18129cb5073e9c4f90f8caacfcf glibc-langpack-wal-2.28-251.el8_10.2.x86_64.rpm 1eb5b6015736980bb1f4ae258e16c2f55ffef01ca8209b80120f2ec653f2f2cd glibc-langpack-wo-2.28-251.el8_10.2.x86_64.rpm 9ef3aa0b287da6d7259426c1bfaf02c6f9877d9e7161bdd39cade8fa35ea2926 glibc-langpack-xh-2.28-251.el8_10.2.x86_64.rpm e72906723e1db0f1925e77902a0bcb24201dda197cb61ce56fa706402195048a glibc-langpack-yi-2.28-251.el8_10.2.x86_64.rpm de41a93b98e40d1490c146487ca67c35341eb1bda3d3eb2ed48d5c34a02ea4e8 glibc-langpack-yo-2.28-251.el8_10.2.x86_64.rpm 84640a518171eac4f3238500a63d21e8afe41b2cb9ef39cd5f81d50bc65290b3 glibc-langpack-yue-2.28-251.el8_10.2.x86_64.rpm 3647320bcaa3ecdb308852d5eae3c2a58ce346d4706ed05315245bdcbb1041cb glibc-langpack-yuw-2.28-251.el8_10.2.x86_64.rpm 15f5c0455c5ebc565b1b55903b897664b04af020a06a0f04a5af9fe9933db2d0 glibc-langpack-zh-2.28-251.el8_10.2.x86_64.rpm 9b95cf02bfe604019d0e89a00bcd87b0545dc3d939674e928ca8e1f79b40b58c glibc-langpack-zu-2.28-251.el8_10.2.x86_64.rpm 35575ee72fe54d0dafb11b2110cc9a081d2a1ffa2959f8480894ba8845495112 glibc-locale-source-2.28-251.el8_10.2.x86_64.rpm 19a07e625196363d6ba81eea384357f812b4c2b73d194cff47d8cdacb5920909 glibc-minimal-langpack-2.28-251.el8_10.2.x86_64.rpm 90510c6fcf5524985073971cf42c731b0b3bf2f6680e26cad763d8711df9e63b libnsl-2.28-251.el8_10.2.x86_64.rpm d2d8fb740919f57a31c5777162d24756bfc1c9012d83473f9272155bbb974dc3 nscd-2.28-251.el8_10.2.x86_64.rpm 2d16aa6ff80372dbfd8061b0e5e243d04d64c1309f5b0362a27438fc9f01254b nss_db-2.28-251.el8_10.2.x86_64.rpm 042c11844b92847f0e672eb3902f56577e075dd8b286597b2769b4bf701e1deb RLBA-2024:3151 acl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for acl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms acl-2.2.53-3.el8.x86_64.rpm 2667ccc2ac3114b73508e2c614502cb629a573b92a49dc0260c685951b0222a5 libacl-2.2.53-3.el8.x86_64.rpm c991ac32e6016a1e7a149f8bfe7600d831c2db2a2db2299d7e09710785c789f5 libacl-devel-2.2.53-3.el8.x86_64.rpm 8c4e9c634f13e89d78d6049fcf8c18ff36d848197cb57a9bc8a3a76de72e5379 RLBA-2024:3150 python-urllib3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-urllib3-1.24.2-7.el8.noarch.rpm 9b2db8ee6315e4ce5bfa1224dae9cd74ee4807b04b4911368193d3982875fd5c RLBA-2024:3149 autofs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms autofs-5.1.4-113.el8.x86_64.rpm 803a8b37bdac877dedd9c9fdb5ad7b2e1163285beb40d515b7a53a70143cf3ee RLBA-2024:3159 python-linux-procfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-linux-procfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms python3-linux-procfs-0.7.3-1.el8.noarch.rpm c726c1c16d23294bcc9d933f2a146650cf699f96d2e78da4a30b24643bbcf211 RLBA-2024:3158 mcelog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mcelog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mcelog-195-0.el8.x86_64.rpm 82a0883eb3bc726ed30776b086b5be95d1dc2e61199cd7b019e2ab74cc23309f RLBA-2024:3157 cockpit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cockpit-310.3-1.el8_10.x86_64.rpm 7554f03a83578a9dd806f208b9ace264a85d6924a09c918d1d888c4439f05cb0 cockpit-bridge-310.3-1.el8_10.x86_64.rpm 05923f07753ee5bbc67b2e54e5d9be36cbe939d710c8238ea4f1b9acfdb60766 cockpit-doc-310.3-1.el8_10.noarch.rpm 09d0260587da36d67475c95ae593e4eab984d050065fec136f63724601599339 cockpit-system-310.3-1.el8_10.noarch.rpm 39da3e77b24c240578a3603b653963535da509fe39873db0dc313ba300eb465d cockpit-ws-310.3-1.el8_10.x86_64.rpm 8d94bcedc0a679a787de1b4cbda77cdb1866392a3325174b04e7127059b95990 RLBA-2024:3165 cups bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms cups-libs-2.2.6-57.el8.x86_64.rpm aa9e53a2f40bbfcd9a4c653d70fce21cb7470d078f80067661c0b0c4d81059af RLBA-2024:3164 dnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dnf-4.7.0-20.el8.noarch.rpm fa9560a29d68f159a8f9db7fd874c5be638e9a19d83af1dc50c2c49c7895e425 dnf-automatic-4.7.0-20.el8.noarch.rpm 59a202af22c1d767d75fef1277304393f2bed7134666b6c69eb820579bf830c6 dnf-data-4.7.0-20.el8.noarch.rpm d2c0ba2bdb3d72d558a4467afea5923c27cdcda5b41f0c23e0d3b9a0881a1e7f python3-dnf-4.7.0-20.el8.noarch.rpm 8195a2a40afcaef2c3c0d9b288bde41ab71847cc2fe2ba24f113a4ae980ca99a yum-4.7.0-20.el8.noarch.rpm 2793583cffdb76e783f1f58fc0f6a19469ac49e7e54726240774257df95e745b RLSA-2024:3163 Moderate: pam security update Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: allowing unprivileged user to block another user namespace (CVE-2024-22365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: allowing unprivileged user to block another user namespace (CVE-2024-22365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms pam-1.3.1-33.el8.x86_64.rpm 9f463d7bebe3e53f46a8170d9b2a2b2d89d99827dd8407e589320de20c532ccb pam-devel-1.3.1-33.el8.x86_64.rpm 1c969bdb0d9fc2f2047519754560ca30218da64d822c2d08df1cce1830e99d8b RLBA-2024:3167 rdma-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rdma-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ibacm-48.0-1.el8.x86_64.rpm 1265c29400c9e2a2befa7c7f10463048de849e2a6be7ac3f1c4b72058fa5ea18 infiniband-diags-48.0-1.el8.x86_64.rpm abb2e5b1eaa18c632eb947f93c13b9267d85bc8cf15b714a1c099eb62c66b9b4 iwpmd-48.0-1.el8.x86_64.rpm 96ffde37f3048734f6346e193d493f71f33a9c7093a1f83d2aeb9178984163f9 libibumad-48.0-1.el8.x86_64.rpm 2810d615e91a15c1e435bae6afbc46917a04573b93aa439eec113c93a71b08a5 libibverbs-48.0-1.el8.x86_64.rpm 5fa3a8658b9788f0e5fa01feb6ef7e827b3b9d0b85df1d8d83d048c26fde30d0 libibverbs-utils-48.0-1.el8.x86_64.rpm 80b18d5eba6a596981955a6351922a15d9c122a9d601a25863881aa892d7472b librdmacm-48.0-1.el8.x86_64.rpm dda55f350f3f8f873ceb4b792c00480db4bc98b470c143e54126b793f34f705d librdmacm-utils-48.0-1.el8.x86_64.rpm 98635409f67fbc52ce8dd90d64c8ab7b778560a8009e3818db7ce4b2aa9f5f49 python3-pyverbs-48.0-1.el8.x86_64.rpm 7bc308339ab8e0eec6082f6143c791ab5b6fc26a61286e3a155db782d0e52284 rdma-core-48.0-1.el8.x86_64.rpm 3d49ff969a5c2f7e165150d5e320d21b9f1bf7371e9e51b8534d806438d6dad0 rdma-core-devel-48.0-1.el8.x86_64.rpm 334e283a95c7b29458c43c403a1efa6730e09f6d8d50759fa65dd588b9f5968e srp_daemon-48.0-1.el8.x86_64.rpm aeb848d8665c1a92e4ad45afa8b6d3bab105f2f217500e75261076eabff5d3bc RLBA-2024:3169 dnf-plugins-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dnf-plugins-core-4.0.21-25.el8.noarch.rpm 069c1e02fbed2d9fdee08d1b9bfb09f590d27b88da3b273f33cd9314a7f803a4 python3-dnf-plugin-post-transaction-actions-4.0.21-25.el8.noarch.rpm 8e9283d4362cea2328da7f8e203a93ca9adf6df29da1ee210c573439b4ecb399 python3-dnf-plugins-core-4.0.21-25.el8.noarch.rpm 236c8eff4747c7391433cc2a447ac03ea95c39307de117a45a4d7bba298a20a9 python3-dnf-plugin-versionlock-4.0.21-25.el8.noarch.rpm 5c5078cbf684d477d9b77e31b8bc227d14f3b2fbc6a8b591ba72a7f8681e2e77 yum-utils-4.0.21-25.el8.noarch.rpm 7ccf9325c27dcbb50eba6ebeada3bef286c402e7edc866d73933099fb50fddac RLEA-2024:3168 libkcapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkcapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libkcapi-1.4.0-2.el8.x86_64.rpm 662a680bb74d3039604e1b27b61b2df2c43bceaa2eae50cf06b0fefacbd7516b libkcapi-hmaccalc-1.4.0-2.el8.x86_64.rpm df58365d7ff391c3fbe7d69738778a7f2800f1cbcfa18110043619581550e323 RLBA-2024:3173 audit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for audit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms audispd-plugins-3.1.2-1.el8.x86_64.rpm 94a78ef2115b063d8c2f983eab93692d09fb333028d2f1d7ff7ca9fa86278775 audispd-plugins-zos-3.1.2-1.el8.x86_64.rpm 7596a8d67b4aabb85ed8f3d0e13c803cbe5599ec5b93a80dac029410442df85a audit-3.1.2-1.el8.x86_64.rpm c94e3b589da8d66aa24bc19d41c199c0b400ac47a583baa7de57d92820f3a915 audit-libs-3.1.2-1.el8.x86_64.rpm 6225888056c3fa4df635f03c45ac6cd21c8e3219ed93d4591c7fb69dae42a701 audit-libs-devel-3.1.2-1.el8.x86_64.rpm 5b6f139b07fc7c6da6db32c9ab8dd8e3702613332c2d4ba83e2b88a3d5739052 python3-audit-3.1.2-1.el8.x86_64.rpm 1931f2508ff87f5d31318b265a5e45475e807cd6e8904e32776903eac6e0e4e9 RLBA-2024:3171 mdadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms mdadm-4.2-14.el8_10.x86_64.rpm bd2596d518b4053803b15650f22cde7d20de90e33527149b6b106e20ad39421b RLBA-2024:3177 numad bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms numad-0.5-27.20150602git.el8.x86_64.rpm 1496b6e93fb2ff201a5760d3bcab32b2482f3c3e2c81cb019a31cbdf8c287dbc RLBA-2024:3174 findutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for findutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms findutils-4.6.0-22.el8.x86_64.rpm e0905d9dbe378412c421ad73ab8729a434f9dc27f0debf1ac7b568cfeedfe98c RLBA-2024:3179 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms avahi-0.7-27.el8.x86_64.rpm 86380ee0d93e20ecc84f449605412f9285f1133e8806cb935a40b40e064f28ae avahi-autoipd-0.7-27.el8.x86_64.rpm 66b19f8c25baaa7115ce7cbbd99dda714ec17f88f5b3c6bd4f209fb9cee84937 avahi-glib-0.7-27.el8.x86_64.rpm cec2bf18b824521afc4dcabf315f457e09d326b76c2dc74ca8e0358419666fea avahi-gobject-0.7-27.el8.x86_64.rpm 5e20ad80353555298fc5a3e6e2e783f44284bac6f55f6342561cc2120a967152 avahi-libs-0.7-27.el8.x86_64.rpm cc891b32a2d955dabade372d294ca4e41f5cf075ff32fde0d7720a413de6d07a python3-avahi-0.7-27.el8.x86_64.rpm 7353bddff8fd908a396505622d6f1b5084805597387d15f0e11f6bafae419e2b RLBA-2024:3182 smartmontools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smartmontools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms smartmontools-7.1-3.el8.x86_64.rpm 7885727656e745420bdb87b569978ea99ba025def417b1598152b84abbcbbfb4 RLBA-2024:3180 dracut bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dracut-049-233.git20240115.el8.x86_64.rpm 8d62ebbfedde9e790f73c2a5fb1c7f94afdebe83f4b0c19fd2e72a285b2d52de dracut-caps-049-233.git20240115.el8.x86_64.rpm 8b47766711f7b0c1291a3f3ac52d52179a849ddd899937a6efb2449d3d35a588 dracut-config-generic-049-233.git20240115.el8.x86_64.rpm 5450cdf4149cd959ed92252e4edccb188149ee06067f6bae2abfb194823b97c0 dracut-config-rescue-049-233.git20240115.el8.x86_64.rpm 729aecd3990f0a5659fe497d82f3e3b834c3041078217dd1fa163bb401bf6abd dracut-live-049-233.git20240115.el8.x86_64.rpm 1101c60660ba1b9287b94dffa27dbd05c207d9cebacaa73cdcb0e679c71a9e00 dracut-network-049-233.git20240115.el8.x86_64.rpm 258d3af5fc6a90a9f43d8efaf3ff9aeafb2220fcd9334271bc62964c412bab24 dracut-squash-049-233.git20240115.el8.x86_64.rpm 94c217da0075819d60dfb2d70f3fe48f0d810c81f985f3414946be475ec5b688 dracut-tools-049-233.git20240115.el8.x86_64.rpm 8d579b132cd47814b9e3e03b2bc541d10e7bf17d80841bc01e1af705e96a83eb RLBA-2024:3181 tpm2-tss bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tpm2-tss-2.3.2-6.el8.x86_64.rpm b1e62af9f2b0b18cbf06a5e6f6e874700b293bbcc8596d6970a9c00d2df2df0e tpm2-tss-devel-2.3.2-6.el8.x86_64.rpm 9a575b1bddd6ce89b3ddfb2f2f6c05c1ef430970b73d82580d87a9bee526b4ae RLBA-2024:3186 libldb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms ldb-tools-2.8.0-0.el8.x86_64.rpm 0e83dd304e9de8868fc2bbe1d73e59a4ae7d0933e2232ee1b1a15c409bf803b2 libldb-2.8.0-0.el8.x86_64.rpm a43740feaacb50156412dcf9deac677fdc72e785998b0abe8d5de9ec9d94494c libldb-devel-2.8.0-0.el8.x86_64.rpm 5215e65b5dcc917f77a5ea56a46ee4c4b4ae1ce4160a996367be0ff0e53292ce python3-ldb-2.8.0-0.el8.x86_64.rpm fabd47906c0dc2bbbdbae77fa57916eaf2090e9ba335272728205658fcc53ee7 RLSA-2024:3184 Moderate: grub2 security update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048) * grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692) * grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048) * grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692) * grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms grub2-common-2.02-156.el8.rocky.0.1.noarch.rpm 8672438a84f9c0ea80fa80d375557bd1965460bfc0e24f4ab27705f85b4f467c grub2-efi-aa64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 21a7a7b661d4f5176b5ddb73a171660a0b90f741ba19e5a986864b5d697623b0 grub2-efi-ia32-2.02-156.el8.rocky.0.1.x86_64.rpm 1b2e15ba1c12783aafec60e0d114d4c0a88f1ce9f0732797bf57cc612e6799e0 grub2-efi-ia32-cdboot-2.02-156.el8.rocky.0.1.x86_64.rpm bcb13327e41ff23e3b2be6db0de2e265a40e1c2b8f3ec85a71d53d1913363893 grub2-efi-ia32-modules-2.02-156.el8.rocky.0.1.noarch.rpm 6a055a026ac4cf272378b45157641031445cc6c7008eb177a1e9bf1e4e188003 grub2-efi-x64-2.02-156.el8.rocky.0.1.x86_64.rpm 285f67755d57f5cb4c1ac136ab3bc7574f73dd988cd9f47ff970a08435caa599 grub2-efi-x64-cdboot-2.02-156.el8.rocky.0.1.x86_64.rpm 254e87a15a5bc68421590213ea69b8b609befaea10ae77abd91b0dea06a48127 grub2-efi-x64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 27b17a886367eed378864d93b9e159725162596131c95d588196e86ad37e301d grub2-pc-2.02-156.el8.rocky.0.1.x86_64.rpm a0b58780d04d9b7bbc7575b0206aa1afa6a8d771d4f2d616cf725aa7a06c0ee8 grub2-pc-modules-2.02-156.el8.rocky.0.1.noarch.rpm c376d6bd24f24eb4869a4305c6ab2ef98a59f352996d45357cac4b2a1b7e2781 grub2-tools-2.02-156.el8.rocky.0.1.x86_64.rpm 638cee01d00640e8238ed9f9f62caf14a05b2483d3a4af8c11d01dfe25b14dd4 grub2-tools-efi-2.02-156.el8.rocky.0.1.x86_64.rpm dcf9b82ddef8fdf1b8ba337deb85cc5ec9445519be959b973d5d5f951e1f5145 grub2-tools-extra-2.02-156.el8.rocky.0.1.x86_64.rpm 586444677a7bb8e51d1e524d19b67d6a698469fdb314019dfa8f4fc188d31ced grub2-tools-minimal-2.02-156.el8.rocky.0.1.x86_64.rpm 21d31f89766504976089a4dd05f29cf60a2dc4c8b20c230a8dbdb090d12f2d0e RLBA-2024:3187 libtevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libtevent-0.16.0-0.el8.x86_64.rpm da7ad69c30733423d56a7e62cb6f120cdfae0ffafddc3b1d7afcaa1c2de81480 libtevent-devel-0.16.0-0.el8.x86_64.rpm 59add89dcf3f92e285e526e2489e6b42ccd23e01df88108ef00d75819d09f969 python3-tevent-0.16.0-0.el8.x86_64.rpm 930aecaee8c07c8e2f84f9bd692c5d7fd6171f335a3e4fe0caf74fef23fa0dd3 RLBA-2024:3190 trousers bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms trousers-0.3.15-2.el8.x86_64.rpm 5b2013e3caed8ec7d711d20171328599927401c5e2ed02b030071d786aa889db trousers-lib-0.3.15-2.el8.x86_64.rpm 32da7eb0aaa584cab9637509b9b1bb5b8ef23654968c578db90eb966008dd565 RLBA-2024:3197 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms librepo-1.14.2-5.el8.x86_64.rpm f881cdfd57a260828d4e4aa1119b87de01ba14b3305759b171008a6189bd3094 python3-librepo-1.14.2-5.el8.x86_64.rpm 6302524b08407755ab7b7eb9d83b6d2661b086732cf4a501b97c3c8df40e5b3f RLBA-2024:3195 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms dnf-plugin-subscription-manager-1.28.42-1.el8.rocky.0.2.x86_64.rpm c2ca2e3445b4921c1a565aefc049dbb28bdb05082f858793e42d969c74830862 python3-cloud-what-1.28.42-1.el8.rocky.0.2.x86_64.rpm d34b407e6ef82436392704a4ed21755eafa8671f658521c3840e930ff4ab156a python3-subscription-manager-rhsm-1.28.42-1.el8.rocky.0.2.x86_64.rpm 274a221a3c89a4d35ab97efaac8438e79cae0e19ab54796e2bad764f83cccf42 python3-syspurpose-1.28.42-1.el8.rocky.0.2.x86_64.rpm b7c34bdf0c51b04a7881d335991dd3f6fcdfc99a05543591efe0ac19719b61b3 rhsm-icons-1.28.42-1.el8.rocky.0.2.noarch.rpm d65e834f65e012f7d86c832024ad0aed7f47cf0d1fa8f17cfdf08d33c986b76d subscription-manager-1.28.42-1.el8.rocky.0.2.x86_64.rpm c011e97749c24bf9862768f89c2af31db3c5fa30c5394a36a88eade61744b63a subscription-manager-cockpit-1.28.42-1.el8.rocky.0.2.noarch.rpm 65db90606dffb188dec079966e58bd4d21a51a41852008b594d0f79b84e0a4a2 subscription-manager-plugin-ostree-1.28.42-1.el8.rocky.0.2.x86_64.rpm 9c9aa52defddef00ed802d4365c98bfd51b0cf40b9e6312cdaa31058fcab3326 RLBA-2024:3196 alsa-sof-firmware bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms alsa-sof-firmware-2023.09.2-1.el8.noarch.rpm 0434bca02fec77f340b26be7279df7d88f1d33ae4a236e4cecb1df5210f2511b alsa-sof-firmware-debug-2023.09.2-1.el8.noarch.rpm 52838109eb8dae18f5d10ab3bc623311bd41c533599734d7146e6840a7dd259b RLBA-2024:3198 shared-mime-info bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shared-mime-info. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms shared-mime-info-1.9-4.el8.x86_64.rpm 3d6018477c7c8089f49b2276821c43659470f67b569c670d2f2d30ca5e308ac5 RLBA-2024:3200 smc-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms smc-tools-1.8.3-1.el8.x86_64.rpm 998f30d545fc7c0035ac0eb8a7cde1f57ef195a066b70259b5dead59d02859b3 RLBA-2024:3199 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms opencryptoki-3.22.0-3.el8.x86_64.rpm 4e54a2719a230304786c654935f1989621d0afaf4b1dde67ed82094eff274f58 opencryptoki-icsftok-3.22.0-3.el8.x86_64.rpm 12505a8c21081c544dc643cdeee426c58580088f9a747891159354eb6a49e7b4 opencryptoki-libs-3.22.0-3.el8.x86_64.rpm f1b28805c63b5987bd615d59df47609a4703bec8e8ce0ee862819119621001c9 opencryptoki-swtok-3.22.0-3.el8.x86_64.rpm 3e2f4f8b4c630b373bc34319108b340981ea93a1425a2a5b8377c1ba19f1b226 opencryptoki-tpmtok-3.22.0-3.el8.x86_64.rpm 5befadd48289b06ac7dab72f7edf2a169f37825989eb333930abfaa25cab9036 RLBA-2024:3201 numatop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numatop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms numatop-2.4-1.el8.x86_64.rpm 2b8c93f2946670f62c21031a6107ee6084d18906269a70408b6c78fe07e6da98 RLBA-2024:3205 iotop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iotop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iotop-0.6-18.el8.noarch.rpm 6b9def672669de10601625eefd3fb0277e1f327e33a12a85bd06881129081010 RLBA-2024:3206 perl-HTTP-Tiny bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms perl-HTTP-Tiny-0.074-3.el8.noarch.rpm ce9e9ec3f33a863a4821fb6fdc872c1cef1f1fae0b63ded1bee3ea25bdd25e7f RLSA-2024:3211 Moderate: traceroute security update The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host. Security Fix(es): * traceroute: improper command line parsing (CVE-2023-46316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for traceroute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host. Security Fix(es): * traceroute: improper command line parsing (CVE-2023-46316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms traceroute-2.1.0-8.el8.x86_64.rpm d12d2e374bf70524db0c077b8a8fced43cd16fb68f7af569a11f2a352a90f460 RLEA-2024:3209 tzdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tzdata-2024a-1.el8.noarch.rpm cce3fd2ca0fc64023c22f9a242d92bbfe3685429daa64b0ce7956de025dde066 RLBA-2024:3216 net-snmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms net-snmp-libs-5.8-30.el8.x86_64.rpm 679cc421ef98607407549bd74f7a9fe1ff598b46cc23719b3cecbf2ebed2022c RLBA-2024:3220 python-pip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-pip-9.0.3-24.el8.rocky.0.noarch.rpm 48027ea5f805c0edb218fe0f241d2b0c34e9f1be8e828997516766dbfe7f96e6 python3-pip-wheel-9.0.3-24.el8.rocky.0.noarch.rpm ccc41a042fbfc423e7cac48dbf161f94d6da6196e1770d2e6bb00232bdfef2c0 RLBA-2024:3225 sgpio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sgpio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms sgpio-1.2.0.10-23.el8.x86_64.rpm 368ce9cf01848509694dbfff771b04f2ebe60b0bd22101c2965497a346b2655c RLBA-2024:3223 fuse bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms fuse-2.9.7-19.el8.x86_64.rpm 57de797128217bc9094edd4305428ce2ef7323e1fffac4bd0b8382481c8b5aca fuse3-3.3.0-19.el8.x86_64.rpm b0d579580a44bcce22ba6b613d4e152f3c0589e6a5eb600b8e1da6458433fffc fuse3-devel-3.3.0-19.el8.x86_64.rpm 803b51c723b4f72389089bc517ce2a0b9f627feadf86c36c6851b995ba72f626 fuse3-libs-3.3.0-19.el8.x86_64.rpm e3d7a931410bdd4a0c1339332e30a06699da1d2f2daf56145e70b229492d4c81 fuse-common-3.3.0-19.el8.x86_64.rpm 2a3bcd2392254f550f19059dac945e67e18ba8705f2d0f2057609142fefd48b2 fuse-devel-2.9.7-19.el8.x86_64.rpm 5e1ca22a2aeb6de60daa91eb68af1da88ea4fb753f9b0f02a199bbcb24bfa4b4 fuse-libs-2.9.7-19.el8.x86_64.rpm bdea8cce8155d059af4b5f88ac89f21e61bd1dee1ea1c4849524a96f08e8731f RLBA-2024:3221 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms tuned-2.22.1-4.el8_10.noarch.rpm 98d42bb16c8dd7ebc21b8b2619c6de04db2ef88b8308c6cbc61d5be4138e7785 tuned-profiles-atomic-2.22.1-4.el8_10.noarch.rpm ce9584475dd7a313f00d838b5f680bf9107b4315336d87af55f2760091a5430b tuned-profiles-compat-2.22.1-4.el8_10.noarch.rpm b0f063d48939f443ec742495e02a9b975fd37fa20245f2c2ee19441b9935508c tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.noarch.rpm 549ab06fd76f805bdcc0f610f089c47e04db2413433309be863bd25da4ffeafd tuned-profiles-mssql-2.22.1-4.el8_10.noarch.rpm 6a4de3754851d2f7503d683655933e59b541b97c01ac98de306c7959477137dc tuned-profiles-oracle-2.22.1-4.el8_10.noarch.rpm 534208b9e8f20cff79150b8a9895af71b1c3414847d02970062037baf3235459 RLEA-2024:3227 intel-cmt-cat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for intel-cmt-cat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms intel-cmt-cat-23.11-1.el8.x86_64.rpm bc736cc1a92f75e4c32601a4462e1d891459c7b3791a01ba597977b60b895a85 RLBA-2024:3231 realmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms realmd-0.17.1-2.el8.x86_64.rpm 46ca49cd546df2738a84ea6f1437644b60ef2e4ac9f772c0071a7e4ce3fca073 RLBA-2024:3230 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms file-5.33-26.el8.x86_64.rpm 1391537ab59f4423693611d9afb72a18a8d5574c8b09900dc0c1d8aaa6d6983d file-libs-5.33-26.el8.x86_64.rpm 27178435ffb2835e5a2ed27c89db8ca176d9495c38e1ab1bb46b8f06c6b2f480 python3-magic-5.33-26.el8.noarch.rpm 83c0b04c8f15ca79012c86a0915dcf0fc5026dc22bebe3de26806cf614fdfbe0 RLBA-2024:3237 bash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms bash-4.4.20-5.el8.x86_64.rpm 572aa2bfce0cc39f9ddbb695f17edf5bb5c766a8e2a4c72591694de467dbfe49 bash-doc-4.4.20-5.el8.x86_64.rpm 4f2b4838dcd441a61bce489da3b481a5209e01e1b78afb6455d0ae80f57dd97b RLBA-2024:3236 expat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms expat-2.2.5-13.el8_10.x86_64.rpm c97b00315444ad9c8f95de3485e98f324848edc2ec470e2a42689512ebc9300c expat-devel-2.2.5-13.el8_10.x86_64.rpm 211e33bcc5e3fe3e2e5d4191e83047784ff7f87f825938424109a476d6c80a4b RLSA-2024:3233 Low: libssh security update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004) * libssh: Missing checks for return values for digests (CVE-2023-6918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004) * libssh: Missing checks for return values for digests (CVE-2023-6918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms libssh-0.9.6-14.el8.x86_64.rpm 7a5e3ecd7deaec39a87dcdc6728e29aff4d690c4400c24848da23e1bf262f02b libssh-config-0.9.6-14.el8.noarch.rpm 802ffb16ca31193afc400d9f057f8bcb04224a85a3452fd878cb4a088823dfe5 RLBA-2024:3232 freeipmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms freeipmi-1.6.14-2.el8.x86_64.rpm 4454067a327a516ad5ec421d4276c6b26b669cf1b34492ce14ff790d2455ed2d freeipmi-bmc-watchdog-1.6.14-2.el8.x86_64.rpm b817f9dc081f08db237f2747ecc04a928ddb164cbf29ef044a79d1bba758750d freeipmi-ipmidetectd-1.6.14-2.el8.x86_64.rpm c9abe01d444c666c88d44b249ce056c31b76aa71b3aa37c7513833bf2f66a92b freeipmi-ipmiseld-1.6.14-2.el8.x86_64.rpm fbcdd7446af52160bb0f8a0b4812ebd7e13aaf9bbfb216aab53e7063658c8f54 RLEA-2024:3235 iproute bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-x86-64-baseos-rpms iproute-6.2.0-6.el8_10.x86_64.rpm f41e8aa9042f3db1d45a98cdd7317f770aaf6f3a734cba6a4f439094b31550b7 iproute-tc-6.2.0-6.el8_10.x86_64.rpm 14f36fe3ae67abf016936643c0d21e89a125f0a2fe083f60f9593b6421c428a7 RLSA-2024:3268 Low: krb5 security update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458) * krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458) * krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms krb5-devel-1.18.2-27.el8_10.x86_64.rpm 1239c701de29f5199962fd28759a84edbfdffed48187b2edc701e392d9f9317f krb5-libs-1.18.2-27.el8_10.x86_64.rpm ddf88e97fb20aa3df6585c929637a8e2300fdf3c53a9789c484e2b53bfbeb1dd krb5-pkinit-1.18.2-27.el8_10.x86_64.rpm 33becdaca5a49807681e04c8ad1017e4040367ff6e608b79b89ce48dfa78acc7 krb5-server-1.18.2-27.el8_10.x86_64.rpm 5c557272e00b0f649775219233b99f6e5743dac738b1506d04692f6f3e0dee74 krb5-server-ldap-1.18.2-27.el8_10.x86_64.rpm 0e9b4cc361baaad86cdb982a60545e4f6df1dfe1ffef5c83500b10fa1a3b5f71 krb5-workstation-1.18.2-27.el8_10.x86_64.rpm 6314d2e8f927049ef10775e37a7cf2221bb0931c0c0e67e023d7bc1adc346935 libkadm5-1.18.2-27.el8_10.x86_64.rpm 1ca34d92e288eb08f7435c5782c50e1682346759299c1472ca22c8bffe834f5b RLSA-2024:3270 Moderate: sssd security update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libipa_hbac-2.9.4-3.el8_10.x86_64.rpm fa30bdada92eb662984a77fac2b25c08435523da160b059280c735f9572085fa libsss_autofs-2.9.4-3.el8_10.x86_64.rpm 7f7720daea270e162cfd68e82f12020ab6c8758e741d33863e022ad90afec109 libsss_certmap-2.9.4-3.el8_10.x86_64.rpm 92a35f896709e628f476e8d68b961528e168bd7e441bf1b96f716261616f7f9f libsss_idmap-2.9.4-3.el8_10.x86_64.rpm 62821d16042a67f2930a11085bab80380bcd147b73bc3efa96dc84d112691048 libsss_nss_idmap-2.9.4-3.el8_10.x86_64.rpm 8d1e90a2f14765e6a88c69c5db7e6abcbeff8da62b164f12d36410173780f434 libsss_simpleifp-2.9.4-3.el8_10.x86_64.rpm db0c4b8027976edf1ccb8540540cb3ec2344e6ff4c7c0c499d951ac21b4e9aaa libsss_sudo-2.9.4-3.el8_10.x86_64.rpm 5be624b3fedd8b76d2e72f8337c062dc6145dda214f60b3bdeef30a3ada73da5 python3-libipa_hbac-2.9.4-3.el8_10.x86_64.rpm c4dfefa67d31b8609ec921f2212b87136a1a3d8f810af73440ad0e9909182625 python3-libsss_nss_idmap-2.9.4-3.el8_10.x86_64.rpm 77b080c1f4219e3a1821d057380839b421c0a848c2a41568202e295f3fe90603 python3-sss-2.9.4-3.el8_10.x86_64.rpm f5b5886a2e64e82d20e7aa2e566d6205be366c5b5b93f29a385ff965bcf26424 python3-sssdconfig-2.9.4-3.el8_10.noarch.rpm f298ff9bf27268b86d01be28afeafd0ebc50b830ea4f338f8c222950c7feae15 python3-sss-murmur-2.9.4-3.el8_10.x86_64.rpm 8eed0e2f48a16fb3da1f79a10f8fdc3d79f4b77f1cb918980f5e04e7274af88f sssd-2.9.4-3.el8_10.x86_64.rpm c398ea23cfce0275fdc9e773f2e4999cfd2425ad5752197b5209274cb98bb2fc sssd-ad-2.9.4-3.el8_10.x86_64.rpm db4dc747049e824dce2a2bc4db9c8d765ffda107ad82484f6d94ca2a3e36556b sssd-client-2.9.4-3.el8_10.x86_64.rpm 32a033e4e941ef4dd9deaaf1269a489993a3b061714fa3f8d9bb69da6c30c8e7 sssd-common-2.9.4-3.el8_10.x86_64.rpm 5b00446afb108093a7f6d33bd7a427f2b25806ec98bc92953e58faff6d4c39dc sssd-common-pac-2.9.4-3.el8_10.x86_64.rpm baec6bd8f9847ce5a3c0e978e3cd4ee3408df6b1b4abcc26de98ad9487c38d08 sssd-dbus-2.9.4-3.el8_10.x86_64.rpm c57f75dfe9d5c11449ffd71cc42cce0123923b9b2f29966861163fb191aa8231 sssd-ipa-2.9.4-3.el8_10.x86_64.rpm f7c92d95b0576ff2d72ae6c2145c210fbff60e8f49290154fdc5f06a4079a99c sssd-kcm-2.9.4-3.el8_10.x86_64.rpm 489988c74b69564cf568924e2a70a7ce191f529872e76235b048f03e36ca8aa8 sssd-krb5-2.9.4-3.el8_10.x86_64.rpm 78c3d161b79cfa3fea66d874b66d7a607a4ea0a74945e738ecd74128487ab140 sssd-krb5-common-2.9.4-3.el8_10.x86_64.rpm e977b775085913a671dd7c9ca6e8cc8009bcc656e2a10ac2a3364e46a876585c sssd-ldap-2.9.4-3.el8_10.x86_64.rpm 2df6b99f746c5668cc5d31e7dbe87acc15e3c6f4bc5f352484dcf3697261d4ba sssd-nfs-idmap-2.9.4-3.el8_10.x86_64.rpm 301c7ac8698f140b363afd0d34d9ef07f39ba58ab89650bea0d2c6071d290b6f sssd-polkit-rules-2.9.4-3.el8_10.x86_64.rpm cbe769d77925a9be210ccc58be3e251eff3f109844fb692c2456793194bcfc99 sssd-proxy-2.9.4-3.el8_10.x86_64.rpm d1149c5f80a226319c782041317e772c880578c0a81e38214f1c774c76d60f83 sssd-tools-2.9.4-3.el8_10.x86_64.rpm b43db3ea5e47d033ff76ce4ce286b0f5968e020323c08726aac5f1942166fcf4 sssd-winbind-idmap-2.9.4-3.el8_10.x86_64.rpm be9f207bc3d487042e05431c7746ef040c5670ba03374ffd4dfbdd4f953bcb52 RLSA-2024:3271 Important: bind and dhcp security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) Bug Fix: * dhcp rebuilt after API change of bind-export-libs For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dhcp, bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) Bug Fix: * dhcp rebuilt after API change of bind-export-libs For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms bind-export-devel-9.11.36-14.el8_10.x86_64.rpm 4d50c99ea9bfc1f02fb0a58e0041547c5a0f14569c17e92842cad1f2a4444508 bind-export-libs-9.11.36-14.el8_10.x86_64.rpm d1a3cac5a8608be38a84fa8247a9d773ec0e8c8f9336255a8d370cbe0c777fb4 dhcp-client-4.3.6-50.el8_10.x86_64.rpm 4dd3a73a37194f7c98114316746ee293e97cb67343812c6027933bac7b95af50 dhcp-common-4.3.6-50.el8_10.noarch.rpm 8c253b3afeaff236bdb93edc0a90444a1c27ad8c2bf70b950edacc1a0fdd2ed2 dhcp-libs-4.3.6-50.el8_10.x86_64.rpm 921a9549260868d455383141f654bf8c8004c38cf55c11c3977d1284f14c6128 dhcp-relay-4.3.6-50.el8_10.x86_64.rpm 22902c3ab149dcab32a0116f5b53d811decfe7e4a78092078f26e25c78c4c536 dhcp-server-4.3.6-50.el8_10.x86_64.rpm 6c4e704ad59a50bda662125ca4cc2aa634c2204edf17b28823646826953f1fb0 RLBA-2024:3272 gcc bug fix update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426) rocky-linux-8-x86-64-baseos-rpms libasan-8.5.0-22.el8_10.x86_64.rpm 2372b311e2c2c7d05b31acf222d31b482f5f03c2d2fbb343c78dd42eb7b3b8b2 libatomic-8.5.0-22.el8_10.x86_64.rpm b360b7a09fd21ce658b2a58a6cdb97207b1652cd0fe4b65978522e9a3fbf3aa2 libatomic-static-8.5.0-22.el8_10.x86_64.rpm 9ebfe3c86cf5b42d3ec1ca9909bba725e14e0237a250a1ae9241c7c9e4aefc53 libgcc-8.5.0-22.el8_10.x86_64.rpm 76e67564d1525df82a1cf9b3a586af925e5b2f42a301efbffeeae11603d8653b libgfortran-8.5.0-22.el8_10.x86_64.rpm f51baa831faa755587661163522a901ba1a930ff4b056141e96fbafc64b427ba libgomp-8.5.0-22.el8_10.x86_64.rpm b3e258c82abe4fbd2dc16abd1787b48aedae765db431873841eb1271beff99cb libgomp-offload-nvptx-8.5.0-22.el8_10.x86_64.rpm 6f1f55e3e67b44480abf4d7af86c9b1a7aaa20604b7ea18bb299edd358f36967 libitm-8.5.0-22.el8_10.x86_64.rpm 8a1899a53e0d7e2c68965ad55f4e10f26477189f69ca95a62531db4f1316d779 liblsan-8.5.0-22.el8_10.x86_64.rpm 589acae8c67bec6bbf3debe7d8bc669c1e572a33d7f45a02d7755d75b0cba796 libquadmath-8.5.0-22.el8_10.x86_64.rpm 3e7a03604c72a0f3a1aae5945f1df09b713de2a8468f3b15c5fb176507243f88 libstdc++-8.5.0-22.el8_10.x86_64.rpm 8c492a58370c114af1cd4fa71f8ba3b833e1e6bc2090dce47aacfac8f39e7a58 libtsan-8.5.0-22.el8_10.x86_64.rpm 2bde02f76dad739bf8d8ef4a176411963500999fc557b2760f22a02a2cdceb23 libubsan-8.5.0-22.el8_10.x86_64.rpm 5bbb3b681a72576cae5cf61bce8aee8b7c2edabd72512367dfc167aa7afd32df RLBA-2024:3274 sos update Please update Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Please update rocky-linux-8-x86-64-baseos-rpms sos-4.7.1-2.el8_10.noarch.rpm abd068e760a11dfa4968b09a736df74a1a67510cb8190dde5dad95474f021197 sos-audit-4.7.1-2.el8_10.noarch.rpm bd4ed92df408c921494faacbcbe20eab0af05319266eeea393440ec623e767d7 RLSA-2024:3275 Moderate: python-dns security update The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode. Security Fix(es): * dnspython: denial of service in stub resolver (CVE-2023-29483) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-dns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode. Security Fix(es): * dnspython: denial of service in stub resolver (CVE-2023-29483) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms python3-dns-1.15.0-12.el8_10.noarch.rpm 952b915ac9bf76ace65688631e26438c6d7fde8ea327b12aa7aebdf3ca6767b8 RLSA-2024:3341 Moderate: gdk-pixbuf2 security update The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms gdk-pixbuf2-2.36.12-6.el8_10.x86_64.rpm e7cbc96f901e71e76e6b55ad5fc30c1ce83f7af855d41ad983237acf75c502c5 RLSA-2024:3344 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms glibc-2.28-251.el8_10.2.x86_64.rpm 5f9dee73acb40bc44f9e30c9798549fe58aa76aed614a844187b5075e4db4304 glibc-all-langpacks-2.28-251.el8_10.2.x86_64.rpm 2b7dfafee58b2672940b0e4ddaaf319f5797a06ed407a8c1f28e8420a065badb glibc-common-2.28-251.el8_10.2.x86_64.rpm 51acbbeb9f97dbc9afeae0f8fe51f5e41c91ef33441a5a1d31410638c34fa657 glibc-devel-2.28-251.el8_10.2.x86_64.rpm 93c3eac9db417548298b90449dc69be3410136d8ccef59ffa996ad690ebd2b16 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-gconv-extra-2.28-251.el8_10.2.x86_64.rpm 890e73820ba5355f7d55020f63fe11d3dde628eaf4227dee344f2c3b6e857e5a glibc-headers-2.28-251.el8_10.2.x86_64.rpm 7d6743a8dbbea1181218ef247608124d77dee6cac82031bb7fe3ec4f5e04a28a glibc-langpack-aa-2.28-251.el8_10.2.x86_64.rpm 678bc555973e19d3ea769af140a21f0a7576458dc02c48a3b64ed72da1dd7e32 glibc-langpack-af-2.28-251.el8_10.2.x86_64.rpm 00c1d27d1a5749eea68a51e0f67602496fa5f3f442b85f6a1a826a6c46f64807 glibc-langpack-agr-2.28-251.el8_10.2.x86_64.rpm 7d575d87e04d8f22de7daf7824efb5d1163d5f0fccaddd10975736df9b76d878 glibc-langpack-ak-2.28-251.el8_10.2.x86_64.rpm 731d5b965205efb67eb1e48b7e76b84202c88874e2cdad1d66f66a8fbc497a2e glibc-langpack-am-2.28-251.el8_10.2.x86_64.rpm 358d6731c5b4dbd2764782afb3cd7ff56a6854d700e8d6a985c93f6732f73f66 glibc-langpack-an-2.28-251.el8_10.2.x86_64.rpm 69954eb1ffb5fe5db98e053287b3c013ea88948eb7da52c8d11675b849c919cf glibc-langpack-anp-2.28-251.el8_10.2.x86_64.rpm 7e429c3e27157fa104f7186f9b103117d48dc325cff420f2a7a490eda09f9064 glibc-langpack-ar-2.28-251.el8_10.2.x86_64.rpm 4cdcd6389a4b7a0c102b44787846eba902740f90d1eb93b771045c2f76f36063 glibc-langpack-as-2.28-251.el8_10.2.x86_64.rpm 22dd94c0ad3bba6f082d1519c25af6e81494751e11c9699cdca083bc20a2ad51 glibc-langpack-ast-2.28-251.el8_10.2.x86_64.rpm 792a7394d99296b91ea7f57eca97c2677708022e25be9a7c449e7ed44ab98472 glibc-langpack-ayc-2.28-251.el8_10.2.x86_64.rpm e5e2695a09b5ddd925caff590df6d514920c30e5ba0b513bc2ee549b0f8910ec glibc-langpack-az-2.28-251.el8_10.2.x86_64.rpm c8d7fb8b1c43ed290cdf420627db251fa9aaf10bf737676aadf7d76bb02ca7b0 glibc-langpack-be-2.28-251.el8_10.2.x86_64.rpm 82386a29f77623edb58f17e8e205eab173dd83d0efbdf10dcc724f18a142a46c glibc-langpack-bem-2.28-251.el8_10.2.x86_64.rpm 03cf8e781a5715aa80dc6d7a124f83267baf70b47066f1a63b50c2792fe147be glibc-langpack-ber-2.28-251.el8_10.2.x86_64.rpm 073287b7918809d1d3c68f8c973aba66f535c93e5d46ca183399d4f679b7a7df glibc-langpack-bg-2.28-251.el8_10.2.x86_64.rpm 8635f78096f91103fe6ff0e76791477ae615fda3947b9cdec41d01b418fac802 glibc-langpack-bhb-2.28-251.el8_10.2.x86_64.rpm 2dfde722f24cd75029ffd26bba8223a330224849985ef2ec3318d6629793ad24 glibc-langpack-bho-2.28-251.el8_10.2.x86_64.rpm d0be0055537fa1ac40d80b887a49323d8319669912589e6f4aa2b2d1f1f80823 glibc-langpack-bi-2.28-251.el8_10.2.x86_64.rpm d7af1f7358f59daa54cb63c026d155d089af7002bff539e8338428a577910a50 glibc-langpack-bn-2.28-251.el8_10.2.x86_64.rpm e71c0edab89074f318267dd37591fef8fa8d7d30236db5fc1642b8b591066ff2 glibc-langpack-bo-2.28-251.el8_10.2.x86_64.rpm 0c379783e6d387f8590f339d799288a8fb67b08d9493ae2616ebb3297b1fe8ac glibc-langpack-br-2.28-251.el8_10.2.x86_64.rpm 31c0c28bd287ebbc4b5d4d1fbb1d302cd9a471161717efc6fc3b01a7664287d9 glibc-langpack-brx-2.28-251.el8_10.2.x86_64.rpm c568de193c0807af757d835d91a988a89e44b3e04bef73a82073d5934727979e glibc-langpack-bs-2.28-251.el8_10.2.x86_64.rpm f543df498a7e63c8f8b55025aaa8b3b3aa0af098eeeb49fa151e899be622f5a0 glibc-langpack-byn-2.28-251.el8_10.2.x86_64.rpm f8fce0af3e0eb179f7341420495a18749d2443c9e8c11aae500d1e5ed70224f4 glibc-langpack-ca-2.28-251.el8_10.2.x86_64.rpm 745ba708a40f5a93d603a60fb50fc194f4fcd115fb4df2df10b5b6a638293c58 glibc-langpack-ce-2.28-251.el8_10.2.x86_64.rpm 59aad0c3adbaca6433df9e570b0f3bf5206592abb8a2fdf006e4407f952563b6 glibc-langpack-chr-2.28-251.el8_10.2.x86_64.rpm 67201e83a0ade666dc3c35f8de0ac8a8b7cff06820533a7840b62a282f08f7f9 glibc-langpack-cmn-2.28-251.el8_10.2.x86_64.rpm 976dcbb8cb8c547ffa0eaaae09e5f6e126748900d29a46f9e34a4073fb7c19ab glibc-langpack-crh-2.28-251.el8_10.2.x86_64.rpm d41a8e229513b1648336206fdfcae7fa14b37aaa35157ddc21f6e2fb56c7e74b glibc-langpack-cs-2.28-251.el8_10.2.x86_64.rpm e0ad588a5059b295dc0b0db39289392b8c4b0bf989dc535f63cec515923795d0 glibc-langpack-csb-2.28-251.el8_10.2.x86_64.rpm 079c408e016d0af342385c701fa580640254847378955ae2b64b42eea579adbd glibc-langpack-cv-2.28-251.el8_10.2.x86_64.rpm 6924b4bf9edfad8bb713820e79b5ae6b7d430fe33fc45970b7d7757e3279c108 glibc-langpack-cy-2.28-251.el8_10.2.x86_64.rpm 7ae8033e698f778a161eadf9ccfa3824667b8937aa6599320229288171d412cc glibc-langpack-da-2.28-251.el8_10.2.x86_64.rpm 12fddd526e7c4b62bbb30080fd2717d33e2a8039d44618a652f7623db4b438b6 glibc-langpack-de-2.28-251.el8_10.2.x86_64.rpm 1c2f533771c3be155b96e49458e3d693283c714a26a9adbdc2f83fa7fe50495d glibc-langpack-doi-2.28-251.el8_10.2.x86_64.rpm e45c09f4b6721fa3315f5d8cbfa0ecc1a50fe02b1c32a0a71f9ed4b32e865693 glibc-langpack-dsb-2.28-251.el8_10.2.x86_64.rpm 3221219511d9ac4cb4972bb02d0a7bc0a93b1356db0dd9c4c00e91bc8fcfd682 glibc-langpack-dv-2.28-251.el8_10.2.x86_64.rpm a0cfc8bc067cc623dc27f017e991bf6c31faca8f72ec42afbd0b3e4c0af184f6 glibc-langpack-dz-2.28-251.el8_10.2.x86_64.rpm 6b3ceaf5682dbe292ca517f0bf9ff783b6c8724555a6bf00e2794c54ec2c70b9 glibc-langpack-el-2.28-251.el8_10.2.x86_64.rpm 28ed38e7008b49ea51ae74cc8d32d6f7dde6bd1b40dcde55e6f7785e901c595c glibc-langpack-en-2.28-251.el8_10.2.x86_64.rpm 2d15d11ef45e5ae103a7948524f6b4e1d72fc4c161e375078ff3e501526aecf2 glibc-langpack-eo-2.28-251.el8_10.2.x86_64.rpm 43745e09ad545ce9f092b3f07c5402640d7bc11a28739d914e01685740d9a19b glibc-langpack-es-2.28-251.el8_10.2.x86_64.rpm 507f3944dc331feba8d74073fff597dc504c4bb849cb585bb8dc50b946fddb85 glibc-langpack-et-2.28-251.el8_10.2.x86_64.rpm 095ec54ceb7c017acf18b54b8b609beccc6d3944801f4fc20b928550cc08b450 glibc-langpack-eu-2.28-251.el8_10.2.x86_64.rpm 02aa6f19a5f096e8ddc4a722e9987f1168e6a8d7f4b42b63eae647ca835b1986 glibc-langpack-fa-2.28-251.el8_10.2.x86_64.rpm 26ef1cfa3bb7f6fad5e1088a725d6cb5c538ab9e006d7560980a9ae6b0ec8438 glibc-langpack-ff-2.28-251.el8_10.2.x86_64.rpm fa21c2030dfa13ee5e30f48487e0486f981d1340c45463eb27644296334d39f4 glibc-langpack-fi-2.28-251.el8_10.2.x86_64.rpm 8c26534ea2ecb803528fac360d1294be94de958453ea863dd672dacb996bdabb glibc-langpack-fil-2.28-251.el8_10.2.x86_64.rpm c57e1b144c9b970b7d28a90446c14b533cb61f2bc3ea19844a3970300b55a74b glibc-langpack-fo-2.28-251.el8_10.2.x86_64.rpm 383cb74c20f5e1cdcecbe5725dfe78323f7748e246b63e054a0cbc9580bcc5ad glibc-langpack-fr-2.28-251.el8_10.2.x86_64.rpm a79b4b5505b207a61cd8fa563d0c394e526dcaf6f177d03bd3efaeaf75f72440 glibc-langpack-fur-2.28-251.el8_10.2.x86_64.rpm b023bb3b1192a392df3af3ac7c34e325f45e7b762d74ef6e155761bbca182513 glibc-langpack-fy-2.28-251.el8_10.2.x86_64.rpm e9b37a499075c3f497f5fe468434be09988b78bd7bb1275be33438058f719487 glibc-langpack-ga-2.28-251.el8_10.2.x86_64.rpm 8f79881c318edc8d8426dab4952afa71fa0ee913334523c6a138019d18050e7a glibc-langpack-gd-2.28-251.el8_10.2.x86_64.rpm ddb954464578a1ab08c11839fdc87729b64e77d98825972610c5b5c8258ba757 glibc-langpack-gez-2.28-251.el8_10.2.x86_64.rpm bf61c5ed8af642d9c80d12b812eb28d9cbaccf646b8258bc1dff077728718ad6 glibc-langpack-gl-2.28-251.el8_10.2.x86_64.rpm 1f0b879a2c932a69dae68f2afa3fad4b86edf0e9bd20d89e6b4b1fd1b7700c8f glibc-langpack-gu-2.28-251.el8_10.2.x86_64.rpm 369146fec93a8a699df6b6e7d88cabdb991583120372beafe5516423c4033cc8 glibc-langpack-gv-2.28-251.el8_10.2.x86_64.rpm d87bbfd46e3a837e15f72b3145d67312e4ffae9ff02df42bdbed293ba5cdf33c glibc-langpack-ha-2.28-251.el8_10.2.x86_64.rpm bb8a77700d4f63b38c9f1cfa03c3eb266d14bdb4983e00297c1a6eba7e78e085 glibc-langpack-hak-2.28-251.el8_10.2.x86_64.rpm 028a64ab550a554f13f2d4e7d5a48ea42e2f49e30062fd71c7d61e5e0df44cd9 glibc-langpack-he-2.28-251.el8_10.2.x86_64.rpm 924332927be6eb3123f138b46eda5d4e75f3813e6628612e9f374f8e3576d5d0 glibc-langpack-hi-2.28-251.el8_10.2.x86_64.rpm 28f9b191b3b92423a451692415347392719f05b940be94a63ed1ccf82c0a113e glibc-langpack-hif-2.28-251.el8_10.2.x86_64.rpm 4ac49b39ed556f2dc105bcf9fc70dda391d188367959da36dd041ff51e35f5a1 glibc-langpack-hne-2.28-251.el8_10.2.x86_64.rpm fe41b322e41f6325fd333c603dbbf2eb145749682632f826da3a427e1c429461 glibc-langpack-hr-2.28-251.el8_10.2.x86_64.rpm 549f4fe7a53b40b3db020cce43ea4f690b9095ceaabb91e45da9d029aa5061a2 glibc-langpack-hsb-2.28-251.el8_10.2.x86_64.rpm f8ec8fe3247b2f76e8dcc84adb53921bf18b188c4a5255e308ca5c0c4b2938c3 glibc-langpack-ht-2.28-251.el8_10.2.x86_64.rpm d76573de02f63b3cfd96219b403fe3a9bc2ebe797fc9b30d3e5f70ee157fe32f glibc-langpack-hu-2.28-251.el8_10.2.x86_64.rpm 791f4e4d1bf95ac28599dfa0842bb0630b99365eecd72f11ce49adb9ed848d17 glibc-langpack-hy-2.28-251.el8_10.2.x86_64.rpm 3e9faa93e76752b1d0244b39b902053e449a1f5b483bfca04a29b367b0eed21b glibc-langpack-ia-2.28-251.el8_10.2.x86_64.rpm 427a67943c925935bf9ffb426883377be8b729e6f9e6475208e8887d998c0379 glibc-langpack-id-2.28-251.el8_10.2.x86_64.rpm 48dd4063c79eca75c2f9a711ca45c836b9711cc1be2c2a5f376ea25b19dc7ef7 glibc-langpack-ig-2.28-251.el8_10.2.x86_64.rpm 5420ec348dcee5c18d891dbdcd01c7d2f40688cffb683451b28f94c575925a3e glibc-langpack-ik-2.28-251.el8_10.2.x86_64.rpm 8f934a1b52b23274a0c853329d472e5b77a5f817cea22a1c9efd39355f15a573 glibc-langpack-is-2.28-251.el8_10.2.x86_64.rpm 1ae21ae2d5b2168231ad17fdfbc08b0aa86ad723fb8b82c08112a742e1651989 glibc-langpack-it-2.28-251.el8_10.2.x86_64.rpm bce92f3ce30bbaf64a75164925a72e36389189e33d24fd3dfb06ca676eb73a05 glibc-langpack-iu-2.28-251.el8_10.2.x86_64.rpm 71957c7cc4ea58595ac87d27580b648f86763cc3dee3b91734cc64ac1f99d615 glibc-langpack-ja-2.28-251.el8_10.2.x86_64.rpm a6b35ef657575f0a61514151fda570f57d8350b151bdde6068453366367a1e48 glibc-langpack-ka-2.28-251.el8_10.2.x86_64.rpm 147b685b5a179f7a4b603d8b9f69f3c88f4c6b843e969981dc6e4e4b4dc5c4b0 glibc-langpack-kab-2.28-251.el8_10.2.x86_64.rpm 74e142ad4472575466c86360fbf98cab1a29667320fb45bc7ed2296fadc3df6f glibc-langpack-kk-2.28-251.el8_10.2.x86_64.rpm c065f705098b0a3ce5d55a8fa124d11d8bd427f8bb31385bf141334d5c5e943d glibc-langpack-kl-2.28-251.el8_10.2.x86_64.rpm b9981fbb4a6665c60f39c8d89b88644f2c9e8f6ad77f9e634cd19e7d523853e8 glibc-langpack-km-2.28-251.el8_10.2.x86_64.rpm 1f33abafceb005944e31668ccc3cc544398d90a2db773a04ebd143a9484c428a glibc-langpack-kn-2.28-251.el8_10.2.x86_64.rpm 0493e45cbd6a68e333280e2b1c348a19c98d4e28c07f51062b620c60aa52d8ae glibc-langpack-ko-2.28-251.el8_10.2.x86_64.rpm e7542e277eb757c903478e7068cd46d097ed1446ae58a9f9e885f66d5d389c0b glibc-langpack-kok-2.28-251.el8_10.2.x86_64.rpm d8cd920473e775b6e38b0777cdad67529b57ddec011218ed8c57285427c68b99 glibc-langpack-ks-2.28-251.el8_10.2.x86_64.rpm 768eb82bece5f0f9533c00e8be8a4a4c460045d2383c9a07536d1230fabde4a7 glibc-langpack-ku-2.28-251.el8_10.2.x86_64.rpm d35d19485a25a327253ecbf5f418e20657062f4c8140e3ef3735a482c276ff3f glibc-langpack-kw-2.28-251.el8_10.2.x86_64.rpm 0d3248dfa96b3d88a43086819dc84cb4379cda8a37f770914e905c075ee4b2e5 glibc-langpack-ky-2.28-251.el8_10.2.x86_64.rpm bdb1ed35128dd6a2fc990940ed0dcae5540f292a3250eb23c01b684b2dd0e907 glibc-langpack-lb-2.28-251.el8_10.2.x86_64.rpm 9d05032ac9c74261cd90944f02365803b97bf04306ec829ca1fe55547a6687af glibc-langpack-lg-2.28-251.el8_10.2.x86_64.rpm 908b6d437e06bf9ec8cae71481b76cdcb40749ed20d81dbe8077d71ecd0ce8e5 glibc-langpack-li-2.28-251.el8_10.2.x86_64.rpm 5a615049259be94a6246a29cfbf60dbce5af334a291cca2793dae1ac43ee11b8 glibc-langpack-lij-2.28-251.el8_10.2.x86_64.rpm 2220b48243ffc0a49abf8642794f8a80640632b7ced4b8f4aea4d0618578afb2 glibc-langpack-ln-2.28-251.el8_10.2.x86_64.rpm 28758e4fc60ba8f68e0201fa1057224d6edc80b37e53b73c956859da08a2c800 glibc-langpack-lo-2.28-251.el8_10.2.x86_64.rpm 68e4d975e599253241f04d8508ed822e4301d355a7fcd95ceea90227b35f5600 glibc-langpack-lt-2.28-251.el8_10.2.x86_64.rpm b6e01840a3ec6c9cbd2b42acf3328f76b16851abd5668ef6d08ed70e6e28e27e glibc-langpack-lv-2.28-251.el8_10.2.x86_64.rpm 23a80868f5904e8a5a42f5b60f5bc6de5e8776a13a58b286242a35f8b4daf2b0 glibc-langpack-lzh-2.28-251.el8_10.2.x86_64.rpm 8173e2480d780004e440c9d8b0934f3c170a9798b9d002ab19361d6b0b2f7144 glibc-langpack-mag-2.28-251.el8_10.2.x86_64.rpm 33d91e0b6e075cc5d51c7c1070d6c477e058f481b9a3db4fa359aabe6ed6f1de glibc-langpack-mai-2.28-251.el8_10.2.x86_64.rpm ae10f7b683c3e62248e9d9ea5b9b2b7a704886e1c807223f62f67e71605f5809 glibc-langpack-mfe-2.28-251.el8_10.2.x86_64.rpm 2e4fc18ac17c9f1689fba44dbb41aadc8af1bc37b4ef807e9a9f9dd4fce865bb glibc-langpack-mg-2.28-251.el8_10.2.x86_64.rpm 950d1e478a3607869b6dfbd588a5bdbdf9dce443bc916f3e9a1338f00067e482 glibc-langpack-mhr-2.28-251.el8_10.2.x86_64.rpm aac7bd2bfc6caf7185ba1873caed149ceeffd5a88eb95ec5a6afba1e10131edf glibc-langpack-mi-2.28-251.el8_10.2.x86_64.rpm af890640054113ecb1df7854eebff20077fcaf6acc6408e79de92a74d1377672 glibc-langpack-miq-2.28-251.el8_10.2.x86_64.rpm bd491484308b3a1c098888de25cdb8f96f29221c45abd462a0616f1245cf3a45 glibc-langpack-mjw-2.28-251.el8_10.2.x86_64.rpm b86fdbe41d7966607aad754e19d044f9fec3b28a0f6c439958856ffebe7e26b0 glibc-langpack-mk-2.28-251.el8_10.2.x86_64.rpm 43471447f330f092544c2fd1e11536369a700dadee7ff3bf0824cdeb66354b26 glibc-langpack-ml-2.28-251.el8_10.2.x86_64.rpm 5dcac47b2ca52d9f1ca08aa3ff55eb1524365ddfcb1390a356470eac3963cf71 glibc-langpack-mn-2.28-251.el8_10.2.x86_64.rpm b1b20399368b8bb11c26de6e29a0c5b990be5d4c68e20ff12095b00e1b3f886b glibc-langpack-mni-2.28-251.el8_10.2.x86_64.rpm b175b810548d2bad4dbcd951e75363c24dfc1a36da7399d09f80a873f5514402 glibc-langpack-mr-2.28-251.el8_10.2.x86_64.rpm d0a50ded1e2a03c8db17e6a3c83bb642f0e36d6d052465ed0b8f4aafdbcf0cf6 glibc-langpack-ms-2.28-251.el8_10.2.x86_64.rpm e5012c8946248d344ac414ccf22cdfc0086face7c295d0550eda4bb87d91de49 glibc-langpack-mt-2.28-251.el8_10.2.x86_64.rpm 747aae2236f92e24e11dc0662cc289bfc826fa5fbdbe57bae811ed27ff525106 glibc-langpack-my-2.28-251.el8_10.2.x86_64.rpm 7296d88c18ac9dc14a0773e4bfcb09039170661047b5058e852eb13bee31c392 glibc-langpack-nan-2.28-251.el8_10.2.x86_64.rpm 705dfb5c56df42f641db33559cf7eaa871986c198b84b975d2656adada02c771 glibc-langpack-nb-2.28-251.el8_10.2.x86_64.rpm 7527c8dd4e8f8202525b8f69c32c234152d779311278beaea60b8ae0cb9d4e27 glibc-langpack-nds-2.28-251.el8_10.2.x86_64.rpm 295b9a3eae9f74a63cc09a68c0ca5bf866ca78612d8cd106b619d24560d65932 glibc-langpack-ne-2.28-251.el8_10.2.x86_64.rpm 4ceaf4ba8f06752c9fb33a16054589d08838bfca9568c29056799d2ef48d29dd glibc-langpack-nhn-2.28-251.el8_10.2.x86_64.rpm 0ccae1034dd3394c31e5033dbeea15d414f2c07bbf47f2586c1faf9941c0a64f glibc-langpack-niu-2.28-251.el8_10.2.x86_64.rpm cb506ea508e9968608a08f6bc5538cad4914971a42dd53600c129796867923e3 glibc-langpack-nl-2.28-251.el8_10.2.x86_64.rpm b4fc5a8c24652b6670e5d3f4fc0b721de4ca99979efc4101775bb75acd683277 glibc-langpack-nn-2.28-251.el8_10.2.x86_64.rpm 28e75248ab4d44967378052d7f0da6da0ba786dfc81248c93a034d2a44b9cd5b glibc-langpack-nr-2.28-251.el8_10.2.x86_64.rpm d23b7a51a276159f15bc561b5568b0bc74add4ac784a9dfd16ef7c8ca4b0dac4 glibc-langpack-nso-2.28-251.el8_10.2.x86_64.rpm 781f4c439a106d3de8afba100e4cbb0b03116e14edd249d9ebc6a0d30cc81b9a glibc-langpack-oc-2.28-251.el8_10.2.x86_64.rpm bbdd72bf1dd2900e66b026ee7dda7282e32fee9e42960e5f3098fa2af22f658b glibc-langpack-om-2.28-251.el8_10.2.x86_64.rpm 46f273d10c54a975804a977a3602d6d9dc49e7a11c44b3cee8cf68ed9e8a0294 glibc-langpack-or-2.28-251.el8_10.2.x86_64.rpm 5ab828d0723654fe62457a52ed057d9de53b111cf0146dc411c2be822815cfec glibc-langpack-os-2.28-251.el8_10.2.x86_64.rpm c423ae35666d1280e8873492fad823eb0c146f528090e59987b40b28392a3531 glibc-langpack-pa-2.28-251.el8_10.2.x86_64.rpm 8c13af6c2019bc154aa7679a599171812fe72e18db51e159504772228147d472 glibc-langpack-pap-2.28-251.el8_10.2.x86_64.rpm c9d37e8b81880578fdf608730daa29a687fe8f66e6e2519a3d38ae6776a6fcc9 glibc-langpack-pl-2.28-251.el8_10.2.x86_64.rpm a98cc53b07a295c4583a78456bae37805117ba2b123a748c90b5b06e1c5452f4 glibc-langpack-ps-2.28-251.el8_10.2.x86_64.rpm 4b1093e6b97cb5d52931ad525cd6694b178f2e6c11d35208240c6a9bd6b02ca4 glibc-langpack-pt-2.28-251.el8_10.2.x86_64.rpm 011e482a92769ed7d041fc53d0ab9bf282a7b4892d56281fc3cc66aee5155edc glibc-langpack-quz-2.28-251.el8_10.2.x86_64.rpm e773879e393de3e44eccc55c92634557fddc85d4d69006e4b53a573df1223116 glibc-langpack-raj-2.28-251.el8_10.2.x86_64.rpm 8b762be9b70dcc76596d64c5959df48e66acdc21eccd05a0ab0736c614f46132 glibc-langpack-ro-2.28-251.el8_10.2.x86_64.rpm c47a02e24700a7f94b7364a23d86b1214b56ebd2f77f74348f95ea11ae3a8777 glibc-langpack-ru-2.28-251.el8_10.2.x86_64.rpm 3396b099397b6b5bdc6437275f95359a842c60806606ae7146687c18ab813342 glibc-langpack-rw-2.28-251.el8_10.2.x86_64.rpm d8ac12464cd4489adfbd0a794068f4af607738e94011f9b8da606f2bdac2ed56 glibc-langpack-sa-2.28-251.el8_10.2.x86_64.rpm d70ac66e8bddde59b4994554d41a885d037333c188ad7b99a2f3a388ec32be1e glibc-langpack-sah-2.28-251.el8_10.2.x86_64.rpm 3d32ae6eb8a62b770ccffac7cdbf35bf28dbd109c0d377f2623a040dc041afe8 glibc-langpack-sat-2.28-251.el8_10.2.x86_64.rpm 2c133dd023815b8c8d2d6583a94cb1095e1113a3ffb6156f4d4ecedee4fb1e13 glibc-langpack-sc-2.28-251.el8_10.2.x86_64.rpm 4cd1c112acb51acff3f9def497dabdf51576c542321a8ee1d9c30e4da3f08a4f glibc-langpack-sd-2.28-251.el8_10.2.x86_64.rpm 05d1b601387c54908d417c435b4ae51e294eac8b5ac0fc0c7087a7fae4f766ea glibc-langpack-se-2.28-251.el8_10.2.x86_64.rpm e92ed74284674a50b700bcf5e6cb01b0d65559e43f3930d2152149e7b161ce62 glibc-langpack-sgs-2.28-251.el8_10.2.x86_64.rpm c38cf7e2973e3853fb6399fbd350f79e886dae2809c02dbdc3361644bf58421d glibc-langpack-shn-2.28-251.el8_10.2.x86_64.rpm d673a586e4b58cacde8334b4e6a76eb47682181f834c8c0d28a3707d53356b12 glibc-langpack-shs-2.28-251.el8_10.2.x86_64.rpm db693e329a857f455666d50df5a4b9de37a89126da8eb57af0d40b4c58ab9450 glibc-langpack-si-2.28-251.el8_10.2.x86_64.rpm f7b33c8c4f2a4cf6997da629f9914ccb3648440a836f04c46b1ba93dcc3ac179 glibc-langpack-sid-2.28-251.el8_10.2.x86_64.rpm d9aba5d855e06fb4dc36686085aefa78b3fd4a9c93056fdd6dd7075b69101488 glibc-langpack-sk-2.28-251.el8_10.2.x86_64.rpm 8c5e06362fc0eaabfc5471faae972c2a529c8f0ecdb9d990de4c8a55e948f121 glibc-langpack-sl-2.28-251.el8_10.2.x86_64.rpm ab104744522496c3de9ca19e8de5ad83bb42b62e13a05f7a3551c1615d3b858e glibc-langpack-sm-2.28-251.el8_10.2.x86_64.rpm c02ea9b2c9be0e6147d85316575e9f3431992de58850c556e0fb4e2acde662f9 glibc-langpack-so-2.28-251.el8_10.2.x86_64.rpm 29215a4a5e972a549301f0bc220b886e3df90c09302820198e01e94b9f6b4be0 glibc-langpack-sq-2.28-251.el8_10.2.x86_64.rpm 62c500e321ab48620d8adaa0bca22deb1de0e0714b7e9578261c1acadfce46aa glibc-langpack-sr-2.28-251.el8_10.2.x86_64.rpm deea0caaeb473645b5d271a396d93be600993e9a7a08a3701a0a3441c46e0117 glibc-langpack-ss-2.28-251.el8_10.2.x86_64.rpm 537059d5672e5eac8f3da47b65fffdb09adce3a4722d027bbdc29d3f4ce95687 glibc-langpack-st-2.28-251.el8_10.2.x86_64.rpm aee36035bde544c10eb8e76a70a7f7b35071827eb6ced0a2b8d9d1a157c1d4f5 glibc-langpack-sv-2.28-251.el8_10.2.x86_64.rpm 8521e9fbaa659cbec4ba16807bb8d2390016a6db6b412163f5b404bf8113eae6 glibc-langpack-sw-2.28-251.el8_10.2.x86_64.rpm 630948481031095547ccc8350f4f1d5c637e548981eae0c21069de1b17af7255 glibc-langpack-szl-2.28-251.el8_10.2.x86_64.rpm f071a52d156069b162b9aaddf515c6811ef36192d11b48d87df62b4f6f4912bc glibc-langpack-ta-2.28-251.el8_10.2.x86_64.rpm 1d2c33dc8bae67ac2c92a635165b4f58f3ec1f60fa5ab6e3f23c0f3f7626df3a glibc-langpack-tcy-2.28-251.el8_10.2.x86_64.rpm 66de27da791d3cd480a6a4e2a502bec8e5d19ec24070681129dc5d67b4add03b glibc-langpack-te-2.28-251.el8_10.2.x86_64.rpm 00a0baee255c77d91758370b7b4b5287334ca66234ef7d16f4687b86723cbb1c glibc-langpack-tg-2.28-251.el8_10.2.x86_64.rpm a50b77000337ed72da1264b1c161c5ceb74807511cac386aa3dfa314e194780d glibc-langpack-th-2.28-251.el8_10.2.x86_64.rpm f0529acbed431c935e36c46e7f14d769ff4c804e1d9e8f7acd5eb526cc5a891e glibc-langpack-the-2.28-251.el8_10.2.x86_64.rpm 1517674368390397f426f0ea3c67fd7a8b251e79131b93d034f60739b30eb315 glibc-langpack-ti-2.28-251.el8_10.2.x86_64.rpm 25dc398ef197302d27eadf28d6339752ea8bb6ed237f71fcca8e03f335af294b glibc-langpack-tig-2.28-251.el8_10.2.x86_64.rpm 77b0c9e8df2fd1b7cdd85fe0271064940d0711f097edbf057d1c6b1e09127ff0 glibc-langpack-tk-2.28-251.el8_10.2.x86_64.rpm 10319835967e2381b17bb23f132cd09df070aff64b6ccf42c3e1511a346474c0 glibc-langpack-tl-2.28-251.el8_10.2.x86_64.rpm e633cb27568417dea243f96fce7531acb2a057e5eb461cb5c589e493181fb609 glibc-langpack-tn-2.28-251.el8_10.2.x86_64.rpm f14e289acb068e8fb14afe956b665e7a78efedc3c3a79390b7af72570aec69b5 glibc-langpack-to-2.28-251.el8_10.2.x86_64.rpm 4c303c213849884535e6b24d3a5944b52b16f505325520eb01870848907532eb glibc-langpack-tpi-2.28-251.el8_10.2.x86_64.rpm f07271a40f66f69a5c0b9bddbdae234b16044bfa42413e5497d62b24d330732e glibc-langpack-tr-2.28-251.el8_10.2.x86_64.rpm 4f9f044d198b92e22e7aae0d90f4f65d2b5417a9271b7517bb7e3674363eb79f glibc-langpack-ts-2.28-251.el8_10.2.x86_64.rpm 0a9fba890241d5b086f896cdaa8bc0f2d0dc1da87caa812b2664a84f130e45cf glibc-langpack-tt-2.28-251.el8_10.2.x86_64.rpm f9c99dc8fa89d297fdec0ae9b5d60602fa65271883c15382e270c240d6a0c13e glibc-langpack-ug-2.28-251.el8_10.2.x86_64.rpm cd11199feb747051a9ea0aeeb2629262ef1f965b8915686edf2973b69593f793 glibc-langpack-uk-2.28-251.el8_10.2.x86_64.rpm 92f51fabd69cf01d3b696b78388944263cd9f2fd6d5062b1f16db67c5b5ae94c glibc-langpack-unm-2.28-251.el8_10.2.x86_64.rpm fabeb82cba4a63dff23e3a7e1083c3372843fa2e4fb2534cdc6a2c8e90822b8f glibc-langpack-ur-2.28-251.el8_10.2.x86_64.rpm af9f61592cdeb78896cf3e95c20d7eea922b8d092c725532b44dfbc7ee582529 glibc-langpack-uz-2.28-251.el8_10.2.x86_64.rpm 50dfea55cab019da3dc21168467a19ab6d1b8d976c0e220a3da929299808550a glibc-langpack-ve-2.28-251.el8_10.2.x86_64.rpm 12b6e812b0c0c796f3f8ff8194a9df5677664da25c19163591153844a72290b5 glibc-langpack-vi-2.28-251.el8_10.2.x86_64.rpm 20146d89efcf2a36e21fef1e628ddb0cd2ff33082b07259bad40a7db3fae3392 glibc-langpack-wa-2.28-251.el8_10.2.x86_64.rpm f2ee3a8091f0189a52546dc5cadc1cb1efc899f543a787955ba1733395444752 glibc-langpack-wae-2.28-251.el8_10.2.x86_64.rpm 946d7b57c6e4f7f4e3ae73fc20376596fc94b18129cb5073e9c4f90f8caacfcf glibc-langpack-wal-2.28-251.el8_10.2.x86_64.rpm 1eb5b6015736980bb1f4ae258e16c2f55ffef01ca8209b80120f2ec653f2f2cd glibc-langpack-wo-2.28-251.el8_10.2.x86_64.rpm 9ef3aa0b287da6d7259426c1bfaf02c6f9877d9e7161bdd39cade8fa35ea2926 glibc-langpack-xh-2.28-251.el8_10.2.x86_64.rpm e72906723e1db0f1925e77902a0bcb24201dda197cb61ce56fa706402195048a glibc-langpack-yi-2.28-251.el8_10.2.x86_64.rpm de41a93b98e40d1490c146487ca67c35341eb1bda3d3eb2ed48d5c34a02ea4e8 glibc-langpack-yo-2.28-251.el8_10.2.x86_64.rpm 84640a518171eac4f3238500a63d21e8afe41b2cb9ef39cd5f81d50bc65290b3 glibc-langpack-yue-2.28-251.el8_10.2.x86_64.rpm 3647320bcaa3ecdb308852d5eae3c2a58ce346d4706ed05315245bdcbb1041cb glibc-langpack-yuw-2.28-251.el8_10.2.x86_64.rpm 15f5c0455c5ebc565b1b55903b897664b04af020a06a0f04a5af9fe9933db2d0 glibc-langpack-zh-2.28-251.el8_10.2.x86_64.rpm 9b95cf02bfe604019d0e89a00bcd87b0545dc3d939674e928ca8e1f79b40b58c glibc-langpack-zu-2.28-251.el8_10.2.x86_64.rpm 35575ee72fe54d0dafb11b2110cc9a081d2a1ffa2959f8480894ba8845495112 glibc-locale-source-2.28-251.el8_10.2.x86_64.rpm 19a07e625196363d6ba81eea384357f812b4c2b73d194cff47d8cdacb5920909 glibc-minimal-langpack-2.28-251.el8_10.2.x86_64.rpm 90510c6fcf5524985073971cf42c731b0b3bf2f6680e26cad763d8711df9e63b libnsl-2.28-251.el8_10.2.x86_64.rpm d2d8fb740919f57a31c5777162d24756bfc1c9012d83473f9272155bbb974dc3 nscd-2.28-251.el8_10.2.x86_64.rpm 2d16aa6ff80372dbfd8061b0e5e243d04d64c1309f5b0362a27438fc9f01254b nss_db-2.28-251.el8_10.2.x86_64.rpm 042c11844b92847f0e672eb3902f56577e075dd8b286597b2769b4bf701e1deb RLSA-2024:3347 Important: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms platform-python-3.6.8-62.el8_10.rocky.0.x86_64.rpm 3ea554540aaa32f04d37c1b0a29689bdcfefaa1c9e7aef0ad1a05e7eea463219 python3-libs-3.6.8-62.el8_10.rocky.0.x86_64.rpm 2cfea010988b1951785cd484bf3f68df04cdd9f3a8a9c81dd23cc9a47057da0b python3-test-3.6.8-62.el8_10.rocky.0.x86_64.rpm d6f24fc049141ddaebe1ff4fefa44a731c3014f36628ffae0b94dd9eb6f25100 RLBA-2024:3358 polkit bug fix update The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Bug Fix(es): * polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Bug Fix(es): * polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029) rocky-linux-8-x86-64-baseos-rpms polkit-0.115-15.el8_10.2.x86_64.rpm 1e822fbe657459ab3ecd59f75e64d5c6ea24704fd7449ac5d16eee7b02e263ff polkit-devel-0.115-15.el8_10.2.x86_64.rpm ab702408ac9d8700f7abc9022fcf648df1db54b3362ee819855e6e0f3c70679d polkit-docs-0.115-15.el8_10.2.noarch.rpm 24198bd5b8ce86b4b06e4f7d605ff3f65ed8d00ee21643881b35af87ee6428dc polkit-libs-0.115-15.el8_10.2.x86_64.rpm b8f2c1c148f056e78a0a7c2b34a26205fa0715bfe041a694fcb28c74f0837f12 RLBA-2024:3381 tuned bug fix update The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es): * tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es): * tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124) rocky-linux-8-x86-64-baseos-rpms tuned-2.22.1-4.el8_10.1.noarch.rpm f900b6cd20f9e14d8364dd0dd82db34a638762d469423dd02ab633d238997e13 tuned-profiles-atomic-2.22.1-4.el8_10.1.noarch.rpm 9b1b3d5f313c2af1ad180eeaa9e964444e4059a143cea35964fe88319a4b0ad5 tuned-profiles-compat-2.22.1-4.el8_10.1.noarch.rpm 66d03ce05980bd92d0890ffbcc1220685127addd1b3e24fd73535313ce362201 tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.1.noarch.rpm 0166597a16e1976563c2ee53be27ba16649091e3ab92d4b24160e1c8a841c403 tuned-profiles-mssql-2.22.1-4.el8_10.1.noarch.rpm e0e075ee3e7fd6c871837aa34482590021f94735cee4a1e8d872dec24fbdb777 tuned-profiles-oracle-2.22.1-4.el8_10.1.noarch.rpm 2e949f7758e994826f506e1889ed2caf38be6f24692aa982591be3f15c015c02 RLSA-2024:3618 Moderate: kernel update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744) * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: use after free in i2c (CVE-2019-25162) * kernel: i2c: validate user data in compat ioctl (CVE-2021-46934) * kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055) * kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118) * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610) * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643) * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642) * kernel: i2c: i801: Don&#39;t generate an interrupt on bus reset (CVE-2021-47153) * kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port &#34;disable&#34; sysfs attribute (CVE-2024-26933) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059) * kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013) * kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744) * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: use after free in i2c (CVE-2019-25162) * kernel: i2c: validate user data in compat ioctl (CVE-2021-46934) * kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055) * kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118) * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610) * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643) * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642) * kernel: i2c: i801: Don&#39;t generate an interrupt on bus reset (CVE-2021-47153) * kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port &#34;disable&#34; sysfs attribute (CVE-2024-26933) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059) * kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013) * kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-553.5.1.el8_10.x86_64.rpm 9283c359eae84658351912b95138141f95cac98791ef5a5a476c5515ff49c110 kernel-4.18.0-553.5.1.el8_10.x86_64.rpm f6f49c9b37c1010d12232ba0697602a4d9fe6d1e32a3b7099aeaecf225f46229 kernel-abi-stablelists-4.18.0-553.5.1.el8_10.noarch.rpm 90980b327ea205a51346967228b957b96581042d62de488c25b7240cfa923a96 kernel-core-4.18.0-553.5.1.el8_10.x86_64.rpm 11563d5171f288fe5e2a93127248ca91f1ee2fdb55d300df7d6b136f50f78f12 kernel-cross-headers-4.18.0-553.5.1.el8_10.x86_64.rpm b1ed97e3c044f4b7d9a33555eea683075efac8f5afc02861de7760331e7ac2d4 kernel-debug-4.18.0-553.5.1.el8_10.x86_64.rpm 7332fb9229723be35718a21c209ed616a2c1a189033d332d58f3eee993b69de7 kernel-debug-core-4.18.0-553.5.1.el8_10.x86_64.rpm 63bd8d0724d28256040c2af5dabc8a89494202b5e7ebf490acf83191a58ba2eb kernel-debug-devel-4.18.0-553.5.1.el8_10.x86_64.rpm 2c746e6daa9b093dab3e90739815664c2903f3509b15a1d97c1cf80c8f8f8bbc kernel-debuginfo-common-x86_64-4.18.0-553.5.1.el8_10.x86_64.rpm a278a4df77e52d53ec6a99af7472162c4a243b162675cb7b144ccc5c164a94d4 kernel-debug-modules-4.18.0-553.5.1.el8_10.x86_64.rpm 4d9c24fef0cec49e0529eea8134c1123c80c9d3be9fa636c5db69ab1a0de963b kernel-debug-modules-extra-4.18.0-553.5.1.el8_10.x86_64.rpm e1443da56289af938308f2f7f562698b79066fbfb0dcf80dd10a7b60c3ec528e kernel-devel-4.18.0-553.5.1.el8_10.x86_64.rpm e55f2c2c82b790bc174fd247cd19c54737531d8d7374db91b43968c1311f5c35 kernel-doc-4.18.0-553.5.1.el8_10.noarch.rpm cd20284242d611eb16894f2de6b0f29b145993ccfea76de1ace9805be0a1390f kernel-headers-4.18.0-553.5.1.el8_10.x86_64.rpm d786a322b35ac66d366c76073d2d280b6371cb7288fe71485fb42cf00f3aff73 kernel-modules-4.18.0-553.5.1.el8_10.x86_64.rpm f25c9913e68bed6807842021ef72ec61747db11e954239e95ea7c8aa4eb4a55a kernel-modules-extra-4.18.0-553.5.1.el8_10.x86_64.rpm 1ae707f7bdd1baba5370ace933c52e22fb65b2f696635b8a5943d62f22267b69 kernel-tools-4.18.0-553.5.1.el8_10.x86_64.rpm 126b122fef8e81effb46592af76ce729bc533412c3e156e9793edd0f115095ba kernel-tools-libs-4.18.0-553.5.1.el8_10.x86_64.rpm 89a7f9106d54ce83ca73aea0853d9b404b1887df447cf796b4e6db88aefa2e5b perf-4.18.0-553.5.1.el8_10.x86_64.rpm 1a856e4547083da670bca6b657608e7230ab87a50f4f4cebf588cc32fd4cb58f python3-perf-4.18.0-553.5.1.el8_10.x86_64.rpm e79fc6e975a8cf125815490c0f66d4232fce3509d8b3fa01ef231446d5f805ec RLSA-2024:3626 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms libxml2-2.9.7-18.el8_10.1.x86_64.rpm 4571f01fdfd33cf1dff725e05e325511f5cf276db1310ff9d93c8f2b7ed35903 python3-libxml2-2.9.7-18.el8_10.1.x86_64.rpm 9f56269fc7cf026e298a1b28e2aeb772de6ffa045815c0c2fb49dbbc8619aca6 RLSA-2024:3667 Moderate: cockpit security update Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms cockpit-310.4-1.el8_10.x86_64.rpm 868bf89adef0927f699d23c17268a52f4bb060724b156bc632acecdf2df592a6 cockpit-bridge-310.4-1.el8_10.x86_64.rpm 982caf942ac116095a13666930047fa39f2be073af650cd8397f8af7549420c0 cockpit-doc-310.4-1.el8_10.noarch.rpm 2fc98216866ffe728743849c8bd1e9e876b32579f57c9b8e172bf2da30594393 cockpit-system-310.4-1.el8_10.noarch.rpm 342a2a051327d592f2fcd641aa4ab0426d1b1fa7bd74297208f5ee64a017fa31 cockpit-ws-310.4-1.el8_10.x86_64.rpm 7b3b3078757fcebc9c1c48eb6d98cf1e4afa3b4501cc735fb30277e854e99cd4 RLBA-2024:4049 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104) * rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106) * sos clean on an existing archive fails to clean anything (Rocky Linux-35945) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104) * rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106) * sos clean on an existing archive fails to clean anything (Rocky Linux-35945) rocky-linux-8-x86-64-baseos-rpms sos-4.7.1-3.el8_10.noarch.rpm 9f99fa4998fc4a7fd86109cbf7352835dd81177932336ce2ef4083c4b21369d4 sos-audit-4.7.1-3.el8_10.noarch.rpm caf87c9a2a6b3179bb70ed0cdc2fe7b38eafd183aa5a37624644c663cf9f1cfc RLSA-2024:4211 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361) * Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048) * [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130) * Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361) * Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048) * [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130) * Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-x86-64-baseos-rpms bpftool-4.18.0-553.8.1.el8_10.x86_64.rpm 606375b21c32f4e07c75b7d9714ef47765e90b4af8ed613e97c218c18185a2d6 kernel-4.18.0-553.8.1.el8_10.x86_64.rpm f61e09f7b600996dfafbe97623881f96fd0e73b3bbfce5d458eb474fc48c963d kernel-abi-stablelists-4.18.0-553.8.1.el8_10.noarch.rpm ce28a833ec84dd9475cf080053603a0d7ee70408d9b343ecb7798f1d8f45c4ef kernel-core-4.18.0-553.8.1.el8_10.x86_64.rpm 3bfa44404b018d4f85dbc3697900826e7bacdfcffd6f4b6d8ae322c37dd78ccb kernel-cross-headers-4.18.0-553.8.1.el8_10.x86_64.rpm b3d4c8e4b1fa4aabaae13d7c3006576cf5da6e238b8c073cdbcdd8897d7d290e kernel-debug-4.18.0-553.8.1.el8_10.x86_64.rpm 24fd8e1dbbc095085276a8af3255543a213b8f9cda4a19d3a70410343d3554d8 kernel-debug-core-4.18.0-553.8.1.el8_10.x86_64.rpm 01974ace84deedd0b1f46698194a250f8e765585818f3c1819b607ee810d0e5c kernel-debug-devel-4.18.0-553.8.1.el8_10.x86_64.rpm 174aaa862669df5120578f762e2f2812bd9985726f54bfdb9d1a2c171a1f9621 kernel-debuginfo-common-x86_64-4.18.0-553.8.1.el8_10.x86_64.rpm 58a7b4ba99a7e28658d5a1bf884d94ad1e2bc3731b6043197fb658a9c5650e39 kernel-debug-modules-4.18.0-553.8.1.el8_10.x86_64.rpm 50b55b72c05b6b75029c555ce30c6547610184fab684f56c68fcfe75b38737f9 kernel-debug-modules-extra-4.18.0-553.8.1.el8_10.x86_64.rpm aedef7cee239cab7d13522cb2afa6dd09e28283d362f626488db3136a5047e4d kernel-devel-4.18.0-553.8.1.el8_10.x86_64.rpm 9547eb97b7a62dc25943b8d00f0eb34c3c660522c5a3d7b886b2a3170ea3297a kernel-doc-4.18.0-553.8.1.el8_10.noarch.rpm a8717793a235f885bcc55160aa46c8e0b5897f0a3928d19927ceabfefd3b2fb3 kernel-headers-4.18.0-553.8.1.el8_10.x86_64.rpm 02eb8ba976663158f56ef5dc52b0db92dc9419cd02d353621fae3f83e5c20e1f kernel-modules-4.18.0-553.8.1.el8_10.x86_64.rpm fc682d78b214cab8b704bc6198e32ae30dfec43816ad54ff575ea3a1dc07b299 kernel-modules-extra-4.18.0-553.8.1.el8_10.x86_64.rpm 192fb778d7f8ada7dac7720e8ee5d8f9f25ed810278f18a3b963ccfd6310cc48 kernel-tools-4.18.0-553.8.1.el8_10.x86_64.rpm f2b8ec0828f61e5c58d84a07970f58ee358a017854ad6d54c2e5fe18b8c1a644 kernel-tools-libs-4.18.0-553.8.1.el8_10.x86_64.rpm f03cbbd4ab4270d683189441e22c910085ce6a6624b410838828cbde51ba6dbf perf-4.18.0-553.8.1.el8_10.x86_64.rpm bf2d61b09257ac646615360832ab9c0eac016eb1efb6ad91ac5b91e00bd75a42 python3-perf-4.18.0-553.8.1.el8_10.x86_64.rpm 89731e7753b4d52e508102bf4195c82cbd82808b2ad96f0a3d1c3ba82412e247