RLEA-2019:3511 libvarlink bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvarlink. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libvarlink-devel-18-3.el8.aarch64.rpm d6418a07e221ceb3e4f7265378a987d2d96f4e94f14e057f1e717b2357d5f2a8 RLSA-2019:3553 Low: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gdk-pixbuf2-xlib-2.36.12-5.el8.aarch64.rpm 395e79cc4261f2e029da140bd244270ff8d56a108a17633011ef08fb1f6674b1 gdk-pixbuf2-xlib-devel-2.36.12-5.el8.aarch64.rpm 80c9d88483e2fb30cc8364da62fa40d7f7983669fbfa054fb3b417b96b90f34b libpurple-devel-2.13.0-5.el8.aarch64.rpm f16ff1b62ce079b97d71e3a71b115cfed22e32ef1e071f82ff8d059e3309bf45 RLBA-2019:3558 libzfcphbaapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libhbaapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libhbaapi-devel-2.2.9-13.el8.aarch64.rpm d7cb90e61dabb55e05422f89833f732e354c23e41b5e158f4b87bd45a357f18f RLBA-2019:3593 ipset bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ipset-devel-7.1-1.el8.aarch64.rpm 0b3d12a19d21fedccf90e4caf0f04932401b42668c1bc64285e28d51c92c430b RLSA-2020:0633 Important: ppp security update The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line. Security Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line. Security Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms ppp-devel-2.4.7-26.el8_1.aarch64.rpm fed85df6c00926fab96ead780e08a239a1dc405259d742dfba609c1776326e78 RLSA-2020:1766 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms clutter-devel-1.26.2-8.el8.aarch64.rpm 70d9c053a71abfa566ebc641369def4a8c4bda27d65cb85abde8082393b63b2d clutter-doc-1.26.2-8.el8.aarch64.rpm 01f4abb032bd63e896d15e15995811eb99f67813919521db123657facc4db734 gnome-menus-devel-3.13.3-11.el8.aarch64.rpm 9655f1f5dc5a6a3a36ee740e8cbd721e56bfc39791267fbe30bb13417f6e8376 mozjs52-devel-52.9.0-2.el8.aarch64.rpm 43d74c8ab5799c42af18b14e4bf4d8e545f52b3b0a217da0e4388f9de891143f mozjs60-devel-60.9.0-4.el8.aarch64.rpm dbc51c9f254cd2837672152dd7b92b627e77010d2265f56a5308e3b4e2737e79 RLBA-2020:1919 ppp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ppp-devel-2.4.7-26.el8_1.aarch64.rpm fed85df6c00926fab96ead780e08a239a1dc405259d742dfba609c1776326e78 RLSA-2020:2755 Important: nghttp2 security update libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libnghttp2-devel-1.33.0-3.el8_3.1.aarch64.rpm 07f7c4e28be394cd871f862d451d8d009243bce39db51547305decc95f876977 nghttp2-1.33.0-3.el8_3.1.aarch64.rpm 447b50538b2bba1e82adf24b317febd2c2e1934d7f3b0db4d48710b4fafa2fd4 RLSA-2020:3654 Moderate: libcroco security update The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. Security Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libcroco. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. Security Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libcroco-devel-0.6.12-4.el8_2.1.aarch64.rpm 3490b1bce032ef7f8257a25c1d0038d19d53a6dfa446c68b78edc6ca317c15a2 RLSA-2020:4451 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms frei0r-devel-1.6.1-7.el8.aarch64.rpm 88d4506493d41c6b67a16eb3729440ca2e45fcea3425df4c36a76802eab9d596 pygobject3-devel-3.28.3-2.el8.aarch64.rpm 7c3790d68c1374f0d820f198b53b781a359e19ab3c26c28dbf4446885fc1691b tracker-devel-2.1.5-2.el8.aarch64.rpm fbf033c0c39b601858b75fcc0c9841bbe51f1ef6a392bd7d42f6ad9f0d8b66be vte291-devel-0.52.4-2.el8.aarch64.rpm 37c01b193488ba0f29867cb77e5e21d9b38a51806d3df01b088502d74b516da0 PackageKit-glib-devel-1.1.12-6.el8.0.2.aarch64.rpm 1aa41b9b134e2fc679be05d29a32ba8a24a92fb6af9a41a635019560bb35442c RLEA-2020:4555 libpsl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpsl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libpsl-devel-0.20.2-6.el8.aarch64.rpm 122855f80f93aba722aed215a6bb8e0144b57d3b23a50f5ddcd882ac7838f911 RLEA-2020:4556 libnetfilter_queue bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnetfilter_queue. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libnetfilter_queue-devel-1.0.4-3.el8.aarch64.rpm 909ba801f4c20405354ebeb119e5227930e18461acb1230a40ac0c78ed158ff8 RLBA-2020:4600 snappy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for snappy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms snappy-devel-1.1.8-3.el8.aarch64.rpm 45a11321fcd50252e3308239180bb7a316c948868161ce495ff257cedbb1a50b RLSA-2021:1586 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms atkmm-devel-2.24.2-7.el8.aarch64.rpm 3ce0f75d449203a3b38c392b77ef1140e121e782fca436176c7399a49aaff063 atkmm-doc-2.24.2-7.el8.noarch.rpm 2598f60483489a4d971135fe643fd9a34d755e4a96c07689ab60bad21a582f59 cairomm-devel-1.12.0-8.el8.aarch64.rpm a4332361dd3875c34647654b7eb2b8ac8906cc859c2cc6a9a332974ca12c1020 cairomm-doc-1.12.0-8.el8.noarch.rpm 138b57e136e261b564d6a902178d07fd422fe83f05caa53a50ec32705ea4174e enchant2-devel-2.2.3-3.el8.aarch64.rpm 39d78a0cdf5f847dc5e03dac4beff2c8a98d8acd586f75b8580f13b9493117fc gamin-devel-0.1.10-32.el8.aarch64.rpm 224fe45aca747ec52ee7efe8238c554bc5cbeb93affb7a2ed8eb4ec98646992f geoclue2-devel-2.5.5-2.el8.aarch64.rpm 3e1fd9077722989c0137f505363af74881362f98dd77436374c719bc2212a6e9 gjs-devel-1.56.2-5.el8.aarch64.rpm 5d8c7eeab9fb183d900ec631e1835adb347f9ccad2b29f84f06e557eab14bad4 glibmm24-devel-2.56.0-2.el8.aarch64.rpm 2da7e692956a605243eac33baf176afa0689dab826071f8e1e5112f0bdc68981 glibmm24-doc-2.56.0-2.el8.noarch.rpm e4c1b83ec081cc5d49aa33270b12bc407eea45ebad3ccdce525e46a88e79503a gtkmm24-devel-2.24.5-6.el8.aarch64.rpm dea4c33c15f8a7f905476971d3ac890002bab261d75a4151a4e0397366121700 gtkmm24-docs-2.24.5-6.el8.noarch.rpm b139c29053b16cd003baef27d687666b3ab39b9c8903011d1b3c7f82f5c275e6 gtkmm30-devel-3.22.2-3.el8.aarch64.rpm e96ea81b12b138b729ea1089b71a1ad2151587f5a9608fa9519692159bdd6766 gtkmm30-doc-3.22.2-3.el8.noarch.rpm 71f74a9b26e199050e0eaf869affba48af9648adea4818093b740b72964dca47 libdazzle-3.28.5-2.el8.aarch64.rpm 0b865d21693613cf5a28ee77a64ba7afe9d76a94e10846670595d72938a51450 libdazzle-devel-3.28.5-2.el8.aarch64.rpm 09b78dd3ac2868b1a16da3479ef702245b074be10804e9cbc3b23a72a75f4d4e libepubgen-devel-0.1.0-3.el8.aarch64.rpm 830206e940b4b2c8acb26587ed284b0a9a76bfcdb88c81c95571e619fc7aa929 libsass-3.4.5-6.el8.aarch64.rpm 0035af205c179c8e27c809be5f2ccf9749f3ad08cdcc112f12a1530cc778e11f libsass-devel-3.4.5-6.el8.aarch64.rpm 304b3e4ca60b9fcf0febc760ed75f4e64231cd795887c0c86af55560a4ca053e libsigc++20-devel-2.10.0-6.el8.aarch64.rpm 2ac82883d78ee3ea6404371b154122ef2edffdfac901a140c9da4255b22101f2 libsigc++20-doc-2.10.0-6.el8.noarch.rpm 4bd0fad981c77439d2f94977a0c5314b008dfa87658055909df65a2cae90ae80 libvisual-devel-0.4.0-25.el8.aarch64.rpm 95827c74199bddbec86fd8a7c275476f9222dd4460179be9c0a9b24c6077e9c2 OpenEXR-devel-2.2.0-12.el8.aarch64.rpm e3d2fe1166489a18b48d61f072f212153adec8a8334b91e8beb4e66647c20384 pangomm-devel-2.40.1-6.el8.aarch64.rpm f352eb7eac3d2c3589fcb7335b582b2c255c59f49de5ae588dff1f272a0ebbab pangomm-doc-2.40.1-6.el8.noarch.rpm 68d1b3c4e9b3cf47ccffa9b02a5ffc49639d3769b9ebb167cd1008c3709debf5 soundtouch-devel-2.0.0-3.el8.aarch64.rpm d3d1d408f971f3198b57b0c08f51081890b83bc27f419126878f2417ebfe5684 vala-0.40.19-2.el8.aarch64.rpm b60736b413a6aebda280c2cd50e0c2f8a6cf01f3df5ecc24103527c990101cd0 vala-devel-0.40.19-2.el8.aarch64.rpm dd42f9f869bf7f30a3d1958756e6c6554851c50beff34d678639463df9d1b360 woff2-devel-1.0.2-5.el8.aarch64.rpm 469ac0794b4cb1ab1c3480c407584cbfd028c41a56027d9c29bebf68b3483ef5 RLBA-2021:1587 librabbitmq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librabbitmq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms librabbitmq-devel-0.9.0-3.el8.aarch64.rpm 062252941bcfd69c109fe8a297c37596bc08359151ad7614276c5024629db899 RLBA-2021:1612 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms avahi-compat-howl-0.7-20.el8.aarch64.rpm 5b4c3edd4f0167d2ee584c68ec876b444735afed90d9b4493be8b2198c950a2f avahi-compat-howl-devel-0.7-20.el8.aarch64.rpm 4f9e209c14bf141d9917ed2ff93ce7138dc193545399b867223a0a8fbe6df516 avahi-compat-libdns_sd-0.7-20.el8.aarch64.rpm 994f6f8bb7a45af3092b5fbebbfaf91aa82d3f79886cce0ff017f15b41cbc2b2 avahi-compat-libdns_sd-devel-0.7-20.el8.aarch64.rpm a19d9a3cf7cf7906a5a623b7420aeabeffb5d82a0bb04a16e73a29612fa5f68c avahi-devel-0.7-20.el8.aarch64.rpm 9c7d64d9f0566a3eda278833d9f5f4245d67c166637e2d1048f51ef033101862 avahi-glib-devel-0.7-20.el8.aarch64.rpm 24c2639cf117cebdf6e8ea0039af196f4ebeb250ddf99e553749fbaf591a2aaa avahi-gobject-devel-0.7-20.el8.aarch64.rpm f202dc252d7e22218a5e202ec45c68aa885112d1b84af4d6e50dbb4ff0febb5f avahi-ui-0.7-20.el8.aarch64.rpm 60a039445f2f0eba99582fa08541336678339dced48b16a719b74c6a90b44112 avahi-ui-devel-0.7-20.el8.aarch64.rpm b67f58cc3357148e1238eaa0719e43ab25192acc810982b92d7a249f267352f6 RLSA-2021:1627 Moderate: trousers security, bug fix, and enhancement update TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware. The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782) Security Fix(es): * trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331) * trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332) * trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware. The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782) Security Fix(es): * trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331) * trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332) * trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms trousers-devel-0.3.15-1.el8.aarch64.rpm 547cf97a0d331e57887d783c5392e85ef70e58e6dd98306101db7a2a18120a6a RLBA-2021:1628 tpm-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms tpm-tools-devel-1.3.9.2-1.el8.aarch64.rpm 2d5fc1eb59830b2f1c278ff7766fd2bccb9f4fd0fb5f4bed6e816abd800bf4fe RLBA-2021:1689 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo, librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms librhsm-devel-0.0.3-4.el8.aarch64.rpm 2b657d230d11a7d2bb7b26b22eeff8dc9adff54bb577279f6b8c88cc39bb33e3 RLEA-2021:1712 libpcap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libpcap-devel-1.9.1-5.el8.aarch64.rpm 8d57af5c12dbf04882c43eb68c423e1ac65e0fae309d2562f9e46172a02e6c45 RLEA-2021:1720 ima-evm-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ima-evm-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ima-evm-utils-devel-1.3.2-12.el8.aarch64.rpm b03137efb42dd9df637a718e5be3f303bb9b1742138eeb8c29393eaf4311dbbb RLBA-2021:1731 userspace-rcu bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for userspace-rcu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms userspace-rcu-devel-0.10.1-4.el8.aarch64.rpm 9feb7f8b3cbf197e236522f051da0430de530f16a4d568cae0f26437a4478135 RLBA-2021:3594 libdb bug fix and enhancement update The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) rocky-linux-8-aarch64-powertools-rpms libdb-cxx-5.3.28-42.el8_4.aarch64.rpm 1f287a8485fd6ba35a6f9c9c759f7411e6724cea7ea67c87e58357087f2b466f libdb-cxx-devel-5.3.28-42.el8_4.aarch64.rpm 72a4362de15c13453dda3bf8cc2c0782c583c302b390270b88cf3d0a2d4e696f libdb-devel-doc-5.3.28-42.el8_4.noarch.rpm 75d6fad816ec9f39c8f77f2d0eb7abcf6a01acb377b20d0d26e389a6a21bf15a libdb-sql-5.3.28-42.el8_4.aarch64.rpm c5cf5c1261dca953db4c11f8c4ae888d05c97691b1b7d73cfc9f98680717c13e libdb-sql-devel-5.3.28-42.el8_4.aarch64.rpm e5f06c20a11a00c96fc2725ca4e2483ed07b2c3f8e1a28aeb83c620d02eb3668 RLBA-2021:4371 libxcrypt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libxcrypt-static-4.1.1-6.el8.aarch64.rpm e541c616e57e4b1f370758a6769e75bc337dba9d818e06d35045ea8a5bdff928 RLSA-2021:4373 Low: pcre security update PCRE is a Perl-compatible regular expression library. Security Fix(es): * pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838) * pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pcre. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PCRE is a Perl-compatible regular expression library. Security Fix(es): * pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838) * pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms pcre-static-8.42-6.el8.aarch64.rpm 7e897d5f423bd097c5b2d9a9a65e4ce5f116332d97db706783d7675bb6913b98 RLBA-2021:4377 quota bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for quota. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms quota-devel-4.04-14.el8.aarch64.rpm de5c04e197e1fa1a441791c8d9c778c548daa3f0a618f999df322606384b95dd RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gnome-software-devel-3.36.1-10.el8.aarch64.rpm b1fe1ce430a9186ef8f3da64f75aae7f0fc609c6ab31094014930355f82cef9c RLEA-2021:4405 libmodulemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libmodulemd-devel-2.13.0-1.el8.aarch64.rpm eccd05e816f2630ab8348bc544618a5dab6eddc2304b10423eb3cd449cffcdaf RLBA-2021:4412 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms opensm-devel-3.3.24-1.el8.aarch64.rpm 9828e7587346eefa799b479e3799c0767c2ffb94b78b2cdad890fea4d8b89965 RLBA-2021:4446 iscsi-initiator-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms iscsi-initiator-utils-devel-6.2.1.4-4.git095f59c.el8.aarch64.rpm 033481967bfd8e23125b4a47dfa4da663c1e1046efc3a19402f484cb23c8805d RLBA-2021:4475 freeipmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms freeipmi-devel-1.6.8-1.el8.aarch64.rpm 1cf47dd06f60d27f912a31285b49fbbd89847dc9dc440062d0607c0fe4715a93 RLBA-2021:4477 parted bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for parted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms parted-devel-3.2-39.el8.aarch64.rpm 0dc8c23dff9be5f0598da039402e558a98011f15f74aeaa9f12765f0c806b664 RLBA-2021:4483 OpenIPMI bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for OpenIPMI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms OpenIPMI-devel-2.0.31-3.el8.aarch64.rpm 740976f572fbdb3a06e21e92ff16de27f9e060abf0421f5392c5a2c09b09c1e8 RLEA-2021:4488 hwloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms hwloc-devel-2.2.0-3.el8.aarch64.rpm df96f75eb5aaa70af9c688a2fe7e64688e6abc23abb48d5c9c1bbc40cac13fe2 RLBA-2021:4505 mobile-broadband-provider-info bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mobile-broadband-provider-info. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms mobile-broadband-provider-info-devel-20210805-1.el8.noarch.rpm 7a39848d36b0cce3fb579b79202c4b768831698134392940e50d2ced22975191 RLBA-2021:4507 fontconfig bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fontconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms fontconfig-devel-doc-2.13.1-4.el8.noarch.rpm f40bd239864c2fb6e63422c5c25a7e6c13abdf87edb075da0286845426005066 RLSA-2021:4510 Low: lua security update The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms lua-devel-5.3.4-12.el8.aarch64.rpm d7074e80409036c94b4af3cba4738f4bc7677fd403c87d5ab4cb7a189854b548 RLSA-2021:4513 Moderate: libsepol security update The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) * libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) * libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsepol. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) * libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) * libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsepol-static-2.9-3.el8.aarch64.rpm 7e64f3cf5d6454ada316e380041c940c5e93622d27cc57b9043fb26c2703b25f RLEA-2022:2014 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms pmix-devel-2.2.5-1.el8.aarch64.rpm c8463f6ed8c90aaeb9a7549dcd27bcc29f2abd23ba380c2bf1a6dbf2f87e3eb1 python3-mpich-3.4.2-1.el8.aarch64.rpm 4a49304075029ff3a6eb5aa11bd91c8b211f004ec5479fda1f7662e9658328e2 python3-openmpi-4.1.1-3.el8.aarch64.rpm 4efc4706dc706800490f4e52cb0aa1b2e618a3c7a21a1f5458135141fba7f132 RLBA-2022:2027 json-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms json-c-doc-0.13.1-3.el8.noarch.rpm d27af04338be30aed0ad2d64bb84dddd51cda618cc346f82d726f0c63a94f98a RLBA-2022:2060 kmod bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms kmod-devel-25-19.el8.aarch64.rpm 3d6898dedcf7caf2eda69826d7836ac488a8765f06c0f6652796fe7e389e8cd0 RLBA-2022:2009 ModemManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ModemManager-devel-1.18.2-1.el8.aarch64.rpm 96722b9fbab2b20238d4d0cacfb95dd6deb20e46bbf6798bb5d8df1dc1fe97f5 ModemManager-glib-devel-1.18.2-1.el8.aarch64.rpm 06ba03a40d9fcc01b4525e109f1b6fd84dc36e81316c7941315e3065dd50d61d RLBA-2022:2035 libstoragemgmt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libstoragemgmt-devel-1.9.1-3.el8.aarch64.rpm e361bde333186ce60f0cb34bb547ef25bb99616b02638fc5f1cb8e2a4d51f171 RLBA-2022:2046 libcomps bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcomps. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libcomps-devel-0.1.18-1.el8.aarch64.rpm 138c9389a234be30a5787c8c29d66bf4ecd6abea004af1bf78b11b2d3e9bd276 RLBA-2022:2089 pcsc-lite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms pcsc-lite-devel-1.9.5-1.el8.aarch64.rpm e2cf99fb4f88d7bf5511ea099b8fea4030aa3ee4d96f6ccdf6e6fb1423191a4d RLBA-2022:2099 sysfsutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysfsutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsysfs-devel-2.1.0-25.el8.aarch64.rpm a75966ebfc47820152f09a39b645e7f215e8135c8676e9d77c07396f4fad88db RLBA-2022:2101 libnftnl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnftnl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libnftnl-devel-1.1.5-5.el8.aarch64.rpm b6790fa35eab8837569c109c2f486c9d139d2f0ccaeaf2f77da872b6aad78dc2 RLBA-2022:2117 gpgme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gpgme-devel-1.13.1-11.el8.aarch64.rpm 7ae86ed2d02b649eecf6e264e10ee92255a601637fb81b67a822aee5d3492fba gpgmepp-devel-1.13.1-11.el8.aarch64.rpm 849de0ad6405675f3edffedea5d096a508c8b37ebb19fb46965d7bce9c007229 qgpgme-devel-1.13.1-11.el8.aarch64.rpm 581ec1afcad28dd03e669e8a8f5535d865ba6e842636620f8a298e010097fb02 RLBA-2022:2118 texinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms texinfo-6.5-7.el8.aarch64.rpm e33bd3ab32d75e32a56c9a0e64bbb742421ac5287f007caa20583bf1fc08915b texinfo-tex-6.5-7.el8.aarch64.rpm 1c59ee6a8d6433caa4bfdeecf9606ff6ef3b352f491ed6d10827b3e865f74c3d RLSA-2022:4991 Important: xz security update XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms xz-lzma-compat-5.2.4-4.el8_6.aarch64.rpm 8b7f1dbc1caa00b21b52ff5d4a1862ea6d2a97bdc46056eae74dcc5bbd07f829 RLSA-2022:5809 Moderate: pcre2 security update The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pcre2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms pcre2-tools-10.32-3.el8_6.aarch64.rpm d6369bf74c05cc12866b0213c16dc0217fb02b3cef7f1c0c5598fce237c623d4 RLBA-2022:5815 bash bug fix and enhancement update The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * Segfault in 'buffered_getchar()' function in bash (BZ#2097659) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * Segfault in 'buffered_getchar()' function in bash (BZ#2097659) rocky-linux-8-aarch64-powertools-rpms bash-devel-4.4.20-4.el8_6.aarch64.rpm 9577d3838b3a1b018850ddd4b50ae41258f97521b7ec55a8bb6144b1e0dcb6fa RLSA-2022:7089 Important: libksba security update KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libksba-devel-1.3.5-8.el8_6.aarch64.rpm ea375b017b32e8a122599ad5f51e85157f6c468225ba425e1e698b60f591376e RLBA-2022:7107 glib2 bug fix and enhancement update GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es) and Enhancement(s): * Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es) and Enhancement(s): * Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615) rocky-linux-8-aarch64-powertools-rpms glib2-doc-2.56.4-158.el8_6.1.noarch.rpm aa64cb9e557a147c0ba86aef7701e556397a660ebaa7822bdc19c57b448ee3f0 glib2-static-2.56.4-158.el8_6.1.aarch64.rpm 0f8a19b268e0fe16bd451aa6559ef625a0065c97b255f4ba78f423921b3f5948 RLBA-2022:7116 libsemanage bug fix and enhancement update The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es) and Enhancement(s): * libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es) and Enhancement(s): * libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139) rocky-linux-8-aarch64-powertools-rpms libsemanage-devel-2.9-9.el8.aarch64.rpm e3b68ccbc3625edefb7633a642bdc7e72c106c57caccc262292706b5a77737ae RLBA-2022:7682 babeltrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for babeltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libbabeltrace-devel-1.5.4-4.el8.aarch64.rpm cf260410671ee1ecc3aa3ce1ec886016a5b3bcc51ea5bd6e855472d4be0e85ab python3-babeltrace-1.5.4-4.el8.aarch64.rpm 2b615b9a5132f0453cfb604114e7beca67a40457c165022bf46c956325be345e RLSA-2022:7683 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Spectre-BHB (CVE-2022-23960) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Spectre-BHB (CVE-2022-23960) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-425.3.1.el8.aarch64.rpm 5b01115a6957b5fc706fe62d039458f47849535f808be68948e60a84a872bb7e RLBA-2022:7684 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms glibc-benchtests-2.28-211.el8.aarch64.rpm 6d58852845479bb4735702a165301ef3fedad5024a6e028d5d2902d9d72ef382 glibc-nss-devel-2.28-211.el8.aarch64.rpm 999fe735c19b950dbb43c7b1e0b3c39ea3707e27089254cdace8265c51c91fa0 glibc-static-2.28-211.el8.aarch64.rpm ad6c9af9a16f201fa46bce989f24b6315facb49a9eaec8233085cf3fcc91bfcf nss_hesiod-2.28-211.el8.aarch64.rpm 9cb58e444a438c542542a72dffb9d29739774f61e9e9b83ff44667830b046499 RLBA-2022:7688 gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gcc-plugin-devel-8.5.0-15.el8.aarch64.rpm 6d685cbc9a46104895773465cabbca140142fbf4a0d3ee969f9399e736a26a9f libstdc++-static-8.5.0-15.el8.aarch64.rpm a115c9dee155c0581c5a79141d187fc41ae9f8d18aa9de4540e21e04c8adfc8f RLSA-2022:7692 Moderate: xmlrpc-c security update XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms xmlrpc-c-c++-1.51.0-8.el8.aarch64.rpm 1c3ff959e2aa3555371b626616ca80b634dd4a583e8f84448ffc254adc955f0a xmlrpc-c-client++-1.51.0-8.el8.aarch64.rpm 998c7865d6a57015886f966dc09437640c11d9faf096676ac90b6c2cd5000ef1 xmlrpc-c-devel-1.51.0-8.el8.aarch64.rpm 2b91f0d1bafe0b998dc97321d6447f45df9fc8ddaf50ad674dd9644831d3fcf5 RLBA-2022:7698 samba bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsmbclient-devel-4.16.4-2.el8.aarch64.rpm f1e2198e2093b2091fba8dacae92c15538a8842338ff3a63549cc942a7b9c921 libwbclient-devel-4.16.4-2.el8.aarch64.rpm 81903b7db0b76afd3a59dae306692a5bb0ec78cf126f3939703333977d772af3 samba-devel-4.16.4-2.el8.aarch64.rpm 1ce18783bd06580846a4b95cdf02d6d920ab9c2de2b87a22f3a02bbe9e9aab42 RLBA-2022:7707 nftables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms nftables-devel-0.9.3-26.el8.aarch64.rpm a56a2130f8aa38495cdf734e7d03f92fbe132fe8a480ba2bdedc4972996e6e2b RLBA-2022:7711 libdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libdnf-devel-0.63.0-11.1.el8.aarch64.rpm bd59516bab7295b99375c1e12853f94aa99540559e018bdc911cb6f5c153d71c RLBA-2022:7713 libsolv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsolv-devel-0.7.20-3.el8.aarch64.rpm 8ca1790650859d8fa60562eb9bea3ac5c27632265c1a314fbdf20daa76a36a6d libsolv-tools-0.7.20-3.el8.aarch64.rpm 231591cf858218021f38b73f149c78a9dd72ce0dfa452b3785cfb82b697e1046 RLBA-2022:7714 device-mapper-multipath bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms device-mapper-multipath-devel-0.8.4-28.el8.aarch64.rpm 2344d05507232dbb9c00ada8b3891b6cb55f464d327350cd3774d1184f946a80 RLBA-2022:7717 elfutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms elfutils-devel-static-0.187-4.el8.aarch64.rpm 4bae4bb7ebdb02d4be7bb665a9897c1777e1299320bf722ee0af5dbf3dd60778 elfutils-libelf-devel-static-0.187-4.el8.aarch64.rpm 615958bb396115fd3956251a2a1843e92eae082e846edb8a95e2b7ad5c318bfd RLSA-2022:7720 Moderate: e2fsprogs security and bug fix update The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for e2fsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libss-devel-1.45.6-5.el8.aarch64.rpm 21f73ef3c5e6a717908c3b225e2764b008893e5237c9df19a884d20725fcc69f RLBA-2022:7724 zlib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms zlib-static-1.2.11-20.el8.aarch64.rpm df0ff729403eb06f1544476865d5e314ee199ac2292c81560f1ed907b761be6f RLBA-2022:7731 ding-libs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ding-libs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libbasicobjects-devel-0.1.1-40.el8.aarch64.rpm d1a16c194a5d50910c095ee107a3443a1239c93e7d320cf54294c2063e959163 libcollection-devel-0.7.0-40.el8.aarch64.rpm 07ff9c398956d0a3adbbcf40e255c0a014620795fa602030aedc872594f1e43f libini_config-devel-1.3.1-40.el8.aarch64.rpm 82a8a5dbb3749c8c08c6d5d38c476bd53732d82463a96be1098e3c1829388ebf libpath_utils-devel-0.2.1-40.el8.aarch64.rpm 759a59951593006ee40bcae07b7fc5814e1150accf4a9774905d08074d2fb81e libref_array-devel-0.1.5-40.el8.aarch64.rpm a1fec07db5c9ee6cfa5f73335efd3f471fefa6381c6e13070983553d268b4d5d RLSA-2022:7730 Moderate: libldb security, bug fix, and enhancement update The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484) Security Fix(es): * samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484) Security Fix(es): * samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-ldb-devel-2.5.2-2.el8.aarch64.rpm 20ed79affadecd7b04d7337e2269d590fc0f25ab9b6001dd875dc563a876f768 python-ldb-devel-common-2.5.2-2.el8.aarch64.rpm 5f4098d0c57e6c38ccbd0b277882adf10c10dd59d2007f405ccd3fa3e52e8241 RLBA-2022:7735 bluez bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms bluez-libs-devel-5.63-1.el8.aarch64.rpm 9864aa8c8cbe75c84f75fdb81504e94f93540af06f73d55c76942ea6cee211f8 RLBA-2022:7737 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms opencryptoki-devel-3.18.0-3.el8.aarch64.rpm 0d9213a2c66345bab707ad84d529821541d825e2a1dcee08cea92ac2a0e26f16 RLBA-2022:7752 iproute bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms iproute-devel-5.18.0-1.el8.aarch64.rpm 80ed895917d1f6d9426fa2d12564d9bd5bf7981cb9d60d50d8ecdcc533e5d6e9 RLBA-2022:7757 sg3_utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sg3_utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms sg3_utils-devel-1.44-6.el8.aarch64.rpm df0409adc7e1ef13b2694178fdf741005b468a2c422d6dc207c845a3e5ceb1c9 RLBA-2022:7760 ndctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms daxctl-devel-71.1-4.el8.aarch64.rpm d5eed906f475779a804fbfb0dc2dccd24762197707da4d5757260dda63c42d67 ndctl-devel-71.1-4.el8.aarch64.rpm d5d856b1b7778bdb19cdc1178ff436ed4942f23d2fff9916ed9f25a06dd70d2a RLBA-2022:7767 libbpf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbpf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libbpf-devel-0.5.0-1.el8.aarch64.rpm 778b4bdbc64e11a4cec8abddb9f04bc7c20801cc82179b2d73cf78165403dd4f libbpf-static-0.5.0-1.el8.aarch64.rpm d8d93fe728658e8357f5cbfeac7fa1ffd05925090a19dc3f347d8dba79c9a32e RLBA-2022:7768 nfs-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libnfsidmap-devel-2.3.3-57.el8.aarch64.rpm cd2a9e6a0d1dca5a8fb1a8a74de5977e5c5d75a988c531d63d7e3c963cd674a5 RLBA-2022:7774 sanlock bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms sanlock-devel-3.8.4-4.el8.aarch64.rpm 9d74a2ddba5a2178bf20962e11aab311d9e20cd7933f9f9962249ba5468de455 RLBA-2022:7780 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms librepo-devel-1.14.2-3.el8.aarch64.rpm 1928eb0a8cfbccf380534dce43af9f05df3dea0192029f84e1848921038249b2 RLBA-2022:7783 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libmount-devel-2.32.1-38.el8.aarch64.rpm cd68ef5a5764de0399aab711f2794bfc144dc0cecb007112c4f0002eea8f29b8 RLBA-2022:7786 libselinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libselinux-static-2.9-6.el8.aarch64.rpm 46ea96a3a539b00a656bfd7d2226ac0c9c8351c55dc1f89acd36576ea3e92010 RLBA-2022:7788 libarchive bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libarchive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libarchive-devel-3.3.3-4.el8.aarch64.rpm 2b7028c3d90c5a480895c6487062d77ecffaeb2809c042ea092718cfa726c249 RLBA-2022:7792 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms device-mapper-devel-1.02.181-6.el8.aarch64.rpm beaaba258ffca016a1f45386505b04b2b8773ea7772e3394bd30c5a5c80a3f50 device-mapper-event-devel-1.02.181-6.el8.aarch64.rpm 794116a151399702cce2a2878d5d167bfd9b2c5bea2fb6b717ea067c04925bbd lvm2-devel-2.03.14-6.el8.aarch64.rpm 5dbe585c0e524a4927a626b25ef387415160f840b89e0a57737e78f40359a8a4 RLBA-2022:7794 shadow-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms shadow-utils-subid-devel-4.6-17.el8.aarch64.rpm a7a33f64077adb33913093f7c1d692eab90e0ea4c9b6c9d2e0767c72ee644b2a RLEA-2022:7797 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libfabric-devel-1.15.1-1.el8.aarch64.rpm 85e619d955fe927962cc13396e7f5c542e0c8759efb87d5885e8c04e48a99ecb RLBA-2022:7800 tpm2-abrmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms tpm2-abrmd-devel-2.3.3-3.el8.aarch64.rpm 3e1eba85059d6d4cf4dc5c20eff4619b7f604d17701fce881023a186fc215e66 RLBA-2022:7802 liblockfile bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liblockfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms liblockfile-devel-1.14-2.el8.aarch64.rpm 28f5d398d669e4d48fa5373bbec28ae4a463cb7df4bb780ba31391b22e6e5c46 RLBA-2022:7803 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-talloc-devel-2.3.3-2.el8.aarch64.rpm 047a908eccf73b68180f4542d28f08d9d1be0d8c560cb6057682cf15a8c7d519 RLBA-2022:7804 libsemanage bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsemanage-devel-2.9-9.el8.aarch64.rpm e3b68ccbc3625edefb7633a642bdc7e72c106c57caccc262292706b5a77737ae RLBA-2022:7808 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms file-devel-5.33-21.el8.aarch64.rpm 48bc33073c2ae622a2e1989ddb9c6946245a39ae85835e59cdb804d6de2130bd RLBA-2022:7809 libpwquality bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpwquality. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libpwquality-devel-1.4.4-5.el8.aarch64.rpm 1baff486601cdbb9410c43d87090d216f20472fec783d00ee3f7bbd5f9f6f3ad RLBA-2022:7828 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) rocky-linux-8-aarch64-powertools-rpms NetworkManager-libnm-devel-1.40.0-2.el8_7.aarch64.rpm d6afd57538d2cc032f255630faf9e154f45b87f07a029b73db172b959977bb04 RLBA-2022:7829 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) rocky-linux-8-aarch64-powertools-rpms libsss_nss_idmap-devel-2.7.3-4.el8_7.1.aarch64.rpm 876fb14ca6ee70e7b6765a8c5ba645a22ff88456304b416f660290d56c48f376 RLSA-2022:7928 Important: device-mapper-multipath security update The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms device-mapper-multipath-devel-0.8.4-28.el8_7.1.aarch64.rpm dbf51d30037ea66cf5cae876c220600dd2324c3ab4efb4ff07fe7f77c1bf0610 RLBA-2022:9028 libsolv bug fix and enhancement update The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Bug Fix(es) and Enhancement(s): * Transaction picks old build to satisfy dependencies (BZ#2151895) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Bug Fix(es) and Enhancement(s): * Transaction picks old build to satisfy dependencies (BZ#2151895) rocky-linux-8-aarch64-powertools-rpms libsolv-devel-0.7.20-4.el8_7.aarch64.rpm 1549de2fad1909d79db33b77b810a8a853bf9d344db6524129a04799ebd5aa8e libsolv-tools-0.7.20-4.el8_7.aarch64.rpm d79e51fd10c11fb718a68d23f2f439ebda6bac29e7cc1b71b07956708eb25835 RLBA-2023:0086 opencryptoki bug fix and enhancement update The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059) rocky-linux-8-aarch64-powertools-rpms opencryptoki-devel-3.18.0-5.el8_7.aarch64.rpm cb33cf1fac3fa4e85b8942a9e33bf832288d20b7f44252c45aba45332e8cfba1 RLBA-2023:0090 zlib bug fix and enhancement update The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336) rocky-linux-8-aarch64-powertools-rpms zlib-static-1.2.11-21.el8_7.aarch64.rpm 12cc9827423e4069ebd337fa1c112c930c058124ac2e55e4cab628467a5428e7 RLBA-2023:0098 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) rocky-linux-8-aarch64-powertools-rpms NetworkManager-libnm-devel-1.40.0-5.el8_7.aarch64.rpm c6e59e50faaa8759aae5dbe09873b268b011423858f1f405ac8a70c4beacdf33 RLSA-2023:0101 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849) * vfio zero page mappings fail after 2M instances (BZ#2128515) * ice: Driver Update up to 5.19 (BZ#2130992) * atlantic: missing hybernate/resume fixes (BZ#2131935) * Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084) * Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813) * ice: Intel E810 PTP clock glitching (BZ#2136036) * ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216) * ice: dump additional CSRs for Tx hang debugging (BZ#2136513) * ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270) * After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157) * i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205) * WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953) * DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216) * Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152) * Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878) * mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957) * net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017) * Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583) * AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218) * Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374) * net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130) * iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081) * Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742) * Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912) * Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849) * vfio zero page mappings fail after 2M instances (BZ#2128515) * ice: Driver Update up to 5.19 (BZ#2130992) * atlantic: missing hybernate/resume fixes (BZ#2131935) * Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084) * Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813) * ice: Intel E810 PTP clock glitching (BZ#2136036) * ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216) * ice: dump additional CSRs for Tx hang debugging (BZ#2136513) * ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270) * After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157) * i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205) * WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953) * DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216) * Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152) * Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878) * mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957) * net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017) * Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583) * AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218) * Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374) * net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130) * iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081) * Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742) * Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912) * Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-425.10.1.el8_7.aarch64.rpm 7dc47f3b792b17656cadf22417d942b1b7b9bf3536a0977d63bbe6329ef37092 RLBA-2023:0105 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) rocky-linux-8-aarch64-powertools-rpms libmount-devel-2.32.1-39.el8_7.aarch64.rpm 32beacfdb1dd7fffeff53b90bacbce2af561f804d2ddaacfedab540f21c019cf RLBA-2023:0106 gcc bug fix and enhancement update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) rocky-linux-8-aarch64-powertools-rpms gcc-plugin-devel-8.5.0-16.el8_7.aarch64.rpm f9da081971fd8bfaaf4c5e0d01025ac0ac85ac68fb6f9e508e73e00b7f920055 libstdc++-static-8.5.0-16.el8_7.aarch64.rpm af475e1a7ce587ad14fa18c36815eb6293bacbb4c5589ee4f95de16b72aeb8e3 RLBA-2023:0124 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) rocky-linux-8-aarch64-powertools-rpms libsss_nss_idmap-devel-2.7.3-4.el8_7.3.aarch64.rpm ec11e1052c6e74eb492cb44a6510b49e3371b32bfabcf6074736c4f7c04b039b RLSA-2019:1529 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up (CVE-2018-8037) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Open redirect in default servlet (CVE-2018-11784) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLSA-2019:2720 Important: pki-deps:10.6 security update The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Deps module contains fundamental packages required as dependencies for the pki-core module by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLSA-2019:2722 Low: libwmf security update The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libwmf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwmf packages provide a library for reading and converting Windows Metafile Format (WMF) vector graphics. The library is used by applications such as GIMP and ImageMagick. Security Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libwmf-devel-0.2.9-8.el8_0.aarch64.rpm 717b1b76322bba8a1d02acfdb5f08ed3e55db4b62289095fd446f41e8e7421ff RLEA-2019:3367 google-noto-cjk-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for google-noto-cjk-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms google-noto-sans-cjk-jp-fonts-20190416-1.el8.noarch.rpm a0e76579364810ba3d2d252d31a1596f921074ca5c231f74257bb2585c08a59b RLBA-2019:3411 lttng-ust bug fix and enhancement update This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lttng-ust. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This update fixes two issues in lttng-ust and subpackages. There was a bad shebang in the /usr/bin/lttng-gen-tp utility that prevented users from executing it. This issue has been fixed. lttng-ust was only available for x86_64 architectures. lttng-ust is now available for all architectures supported on Rocky Linux. rocky-linux-8-aarch64-powertools-rpms lttng-ust-devel-2.8.1-11.el8.aarch64.rpm 09615b2f23fca15b7599e297aa89a3c1a8573619350f8fcd2502da18805d6a34 RLBA-2019:3416 pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLBA-2019:3449 new packages: gcc-toolset-9-dyninst GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-9-dyninst packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 9 chapter. For detailed changes in this release, see the Rocky Linux 8.1 Release Notes. rocky-linux-8-aarch64-powertools-rpms gcc-toolset-9-dyninst-devel-10.1.0-1.el8.aarch64.rpm ce191ce5e105a9dc6ba0f919f4e34a6a2a4fd872c4499cd99beca03b65180a30 gcc-toolset-9-dyninst-doc-10.1.0-1.el8.aarch64.rpm aaf0e9ef84ac71789aa0b8dfb5bfb712f4a9b4ab4fef4e4cab6e8c44afacd4d2 gcc-toolset-9-dyninst-static-10.1.0-1.el8.aarch64.rpm 864b0fcce1c5d4ac3fbb71ae345e2e51fc67d1786f51998cbe1be30baecdc420 gcc-toolset-9-dyninst-testsuite-10.1.0-1.el8.aarch64.rpm 39ca6894d36b34eac5f291bf34a984c89be38b0cbdf61a0ef054f22f5752a30f RLBA-2019:3462 libcdio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcdio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libcdio-devel-2.0.0-3.el8.aarch64.rpm 564e95a76c78f88225bd431cb4b8dbe36a060a18f81589ecda633323195bfdbc RLBA-2019:3490 ldns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ldns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ldns-devel-1.7.0-21.el8.aarch64.rpm 8dbbc08ded1fcaed06fb469a89eacd62f76b7454ef226f9526d47daaa5330dc3 RLEA-2019:3557 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cmocka, nss_wrapper, uid_wrapper, socket_wrapper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libcmocka-1.1.5-1.el8.aarch64.rpm 92cbca5860fc91a59e88658d92996f9394b52398bd76acd65e36cb1bd387bd77 libcmocka-devel-1.1.5-1.el8.aarch64.rpm d7dafcccc8cdeb114eefc277565bc0048883d3896514728368392175c39339b7 socket_wrapper-1.2.3-1.el8.aarch64.rpm fd06ef4a6fe6adedd2c0d1fdf71ff159745b43e256e846368768af6e283e1dec uid_wrapper-1.2.4-4.el8.aarch64.rpm c3e1b6eac7dfbfd6b60f0c47f8be3f00c777d9e519d46dc1524f7eda1d350af8 RLSA-2019:3703 Low: libvorbis security update The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libvorbis. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Security Fix(es): * libvorbis: heap buffer overflow in mapping0_forward function (CVE-2018-10392) * libvorbis: stack buffer overflow in bark_noise_hybridmp function (CVE-2018-10393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libvorbis-devel-1.3.6-2.el8.aarch64.rpm 45b27f8070d22a81e24a5710eb61b29c0c7abeef076529d2ecaeda1acb566366 libvorbis-devel-docs-1.3.6-2.el8.noarch.rpm 0ec54402929c83ee0af4f575e419e9f859ae3c1f202e05ed60124210e96622b7 RLSA-2019:3708 Moderate: mariadb:10.3 security and bug fix update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for asio, Judy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.17), galera (25.3.26). (BZ#1701687, BZ#1711265, BZ#1741358) Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Jan 2019) (CVE-2019-2510) * mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) (CVE-2019-2537) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: InnoDB unspecified vulnerability (CPU Apr 2019) (CVE-2019-2628) * mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) (CVE-2019-2737) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) (CVE-2019-2739) * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) (CVE-2019-2740) * mysql: InnoDB unspecified vulnerability (CPU Jul 2019) (CVE-2019-2758) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) (CVE-2019-2805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__mariadb-devel asio-devel-1.10.8-7.module+el8.5.0+777+18007c86.aarch64.rpm cf505dedb0f59a8623402e4faef396217633715710cbe58ef949d1c3b2779a2b RLSA-2020:1577 Moderate: exiv2 security, bug fix, and enhancement update The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgexiv2, gnome-color-manager, gegl, exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. The following packages have been upgraded to a later upstream version: exiv2 (0.27.2). (BZ#1651917) Security Fix(es): * exiv2: infinite loop and hang in Jp2Image::readMetadata() in jp2image.cpp could lead to DoS (CVE-2019-20421) * exiv2: null pointer dereference in the Exiv2::DataValue::toLong function in value.cpp (CVE-2017-18005) * exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp (CVE-2018-4868) * exiv2: assertion failure in BigTiffImage::readData in bigtiffimage.cpp (CVE-2018-9303) * exiv2: divide by zero in BigTiffImage::printIFD in bigtiffimage.cpp (CVE-2018-9304) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: buffer overflow in samples/geotag.cpp (CVE-2018-14338) * exiv2: heap-based buffer overflow in Exiv2::d2Data in types.cpp (CVE-2018-17229) * exiv2: heap-based buffer overflow in Exiv2::ul2Data in types.cpp (CVE-2018-17230) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099) * exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service (CVE-2019-9143) * exiv2: denial of service in PngImage::readMetadata (CVE-2019-13109) * exiv2: integer overflow in WebPImage::decodeChunks leads to denial of service (CVE-2019-13111) * exiv2: uncontrolled memory allocation in PngChunk::parseChunkContent causing denial of service (CVE-2019-13112) * exiv2: invalid data location in CRW image file causing denial of service (CVE-2019-13113) * exiv2: null-pointer dereference in http.c causing denial of service (CVE-2019-13114) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libgexiv2-devel-0.10.8-4.el8.aarch64.rpm 1ed9e22b26142d0dfb723c54115db96a3d20fe0344f299f735f67f6cb65cafd7 RLEA-2020:1607 http-parser bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for http-parser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms http-parser-devel-2.8.0-9.el8.aarch64.rpm 310395243967fb34ff1618f9325450b293ef702229992d790b69648754c47778 RLEA-2020:1611 input stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xkeyboard-config, libevdev, libxkbcommon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libxkbcommon-x11-devel-0.9.1-1.el8.aarch64.rpm 7620a5fd0b1703d77cd5c443726218caf7c54d774f1c7053aaf90f83bbd04f50 RLSA-2020:1616 Low: irssi security update Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for irssi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Irssi is a modular IRC client with Perl scripting. Security Fix(es): * irssi: use after free when sending SASL login to server (CVE-2019-13045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms irssi-devel-1.1.1-3.el8.aarch64.rpm 0517be3e3827c8c69c705d0a59041666de8bc9ce5e156808acf474f7ae880b1e RLBA-2020:1622 python-greenlet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-greenlet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-greenlet-devel-0.4.13-4.el8.aarch64.rpm 655d1e8316c6de9f5e8f8c0d9dc00cf09cf905c0a16c00d077ce7891c0cbfe10 RLSA-2020:1631 Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmad, gstreamer1-plugins-ugly-free, gstreamer1-plugins-bad-free, SDL2, orc, gstreamer1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GStreamer library provides a streaming media framework based on graphs of media data filters. The libmad package is an MPEG audio decoder capable of 24-bit output. Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. Security Fix(es): * libmad: Double-free in the mad_decoder_run() function (CVE-2018-7263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gstreamer1-plugins-bad-free-devel-1.16.1-1.el8.aarch64.rpm 0d830525b1eb12640fa39d43fab21ab1175dd3c50c2c20acf2b788fbe19d9763 libmad-devel-0.15.1b-25.el8.aarch64.rpm db9a0f107a6ddfd5ccfcd8abcfcf15baa139948521060956e3f77afd1f5d20e1 SDL2-2.0.10-2.el8.aarch64.rpm 404e875dd408a78e46de20ef1169db6fd90c0916e5ecbdfc569d1dc550b5ad02 SDL2-devel-2.0.10-2.el8.aarch64.rpm 7d8c0e9098d177cfed198c506bec92fc4da9b170ef62196ce95d704841da612f SDL2-static-2.0.10-2.el8.aarch64.rpm e83d1792909781afde7c1848a0142c03c4ccd3fe169778c9563fc6b255957d58 RLBA-2020:1633 xorg X11 server and driver bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libepoxy, wayland, libxcb, mesa-libGLw, wayland-protocols, libXpm, xorg-x11-drv-libinput, pixman, xorg-x11-drv-wacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms xorg-x11-drv-libinput-devel-0.29.0-1.el8.aarch64.rpm 2134a6b8972c02cc14535af8814b609c3318e1e42a3a30674c456d24bc5ae951 xorg-x11-drv-wacom-devel-0.38.0-1.el8.aarch64.rpm dfdb8fd54b56c3d5bce942fc342929d6f9923235de25102cba2159f073b89a04 RLSA-2020:1644 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540) * jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335) * jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942) * jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943) * jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLSA-2020:1686 Low: libmspack security and bug fix update The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libmspack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft. Security Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libmspack-devel-0.7-0.3.alpha.el8.4.aarch64.rpm 24c40ae57e3c09c3b8c49f8b71d6041d22dc39f181d5c3f73c94992c1f4a2a8b RLEA-2020:1694 new module: python38:3.8 This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-urllib3, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python-asn1crypto, python-py, python-chardet, python-markupsafe, python-pluggy, Cython, python-psutil, python-wcwidth, babel, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the python38:3.8 module to Rocky Linux 8. (BZ#1747329) For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python38-devel python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm 4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313 python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6 python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8 python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1 python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm 9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4 python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86 python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d RLBA-2020:1723 parfait:0.5 bug fix update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for uom-parent, parfait, uom-systems, uom-se, si-units, uom-lib, unit-api, log4j12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools log4j12-1.2.17-22.module+el8.3.0+74+855e3f5d.noarch.rpm 9961be644ddb26496002a814c140467e745ae1f78f8d2c45821b6ed204c8d895 log4j12-javadoc-1.2.17-22.module+el8.3.0+74+855e3f5d.noarch.rpm 741bc047281e2b80e32525a1edead2b0bdf377079a04e68d11e69259af00e18e RLBA-2020:1743 librevenge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librevenge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms librevenge-devel-0.0.4-12.el8.aarch64.rpm a9a13d6de5e0213fe4ac2fdb800da153c1cec091b804d67a13b4f900f6abdc56 RLSA-2021:4235 Moderate: jasper security update JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jasper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Security Fix(es): * jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c (CVE-2020-27828) * jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c (CVE-2021-3272) * jasper: Out of bounds read in jp2_decode() in jp2_dec.c (CVE-2021-26926) * jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c (CVE-2021-26927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms jasper-devel-2.0.14-5.el8.aarch64.rpm 42b6247aa324c1d0971be0f6d0f6a0104c9ea6b2f3c5955d9478bdf11da62c12 RLEA-2021:4239 pki-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm 0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLSA-2021:4256 Moderate: graphviz security update Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for graphviz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Graphviz is open-source graph-visualization software. Graph visualization is a way of representing structural information as diagrams of abstract graphs and networks. It has important applications in networking, bioinformatics, software engineering, database and web design, machine learning, and in visual interfaces for other technical domains. Security Fix(es): * graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (CVE-2020-18032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms graphviz-devel-2.40.1-43.el8.aarch64.rpm e8f9a469eb575b82b50f2892e2fc637ef3d935dfbc3df6b013ef462505cf9fcc graphviz-doc-2.40.1-43.el8.aarch64.rpm 6b420964f1d54eaf941baf5d431515c9b1a7e591e5d2874212040ec9a6f235e6 graphviz-gd-2.40.1-43.el8.aarch64.rpm a3ecff72598ecb0af52654fd58167f3cf1abdf4f661f446e2d51eccab5b90a33 graphviz-python3-2.40.1-43.el8.aarch64.rpm 88b448ea959cc1d9e7f45bd2d91451941e223f4717d0766c72195267249c57aa RLSA-2020:4629 Moderate: libvpx security update The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvpx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc (CVE-2019-2126) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Resource exhaustion after memory leak in mkvparser.cc (CVE-2019-9371) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libvpx-devel-1.7.0-8.el8.aarch64.rpm 970df117e089f32b13f6c5f92f7b160bb2664281a4b0bc0dfa72f0a7b16e9fdb RLBA-2020:4658 munge bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for munge. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms munge-devel-0.5.13-2.el8.aarch64.rpm af41ee20f24b596b9ead774d629c99fd79b08931bda36d156a13918daca2ff82 RLBA-2020:4678 tog-pegasus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tog-pegasus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms tog-pegasus-devel-2.14.1-46.el8.aarch64.rpm 5436c3477f75e5c2b314175911b77747f6672bd74c014981f34eb47e44c3b4e6 RLEA-2020:4700 createrepo_c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for drpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms drpm-devel-0.4.1-3.el8.aarch64.rpm 670afe0006731a1965d56df01104a6b4fea219a714470e02b56d0b8d150de0f0 RLSA-2020:4847 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * jquery: Passing HTML containing <option> elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) * pki: Dogtag's python client does not validate certificates (CVE-2020-15720) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm 0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLEA-2020:4742 userspace graphics, xorg-x11, and mesa bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libXft, xorg-x11-xkb-utils, xorg-x11-xtrans-devel, xorg-x11-drv-intel, libvdpau, libxkbfile, libXxf86dga, libXau, libXrandr, xorg-x11-proto-devel, xorg-x11-util-macros, libXext, libXi, libXdmcp, libXmu, libXvMC, mesa-demos, xorg-x11-drv-ati. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libvdpau-devel-1.4-2.el8.aarch64.rpm 6d15badc349ea2ebfa002851e677d222480af05439f9e025a8792a2a429ea134 libXdmcp-devel-1.1.3-1.el8.aarch64.rpm 706cfcd9ae3a844e230107446d69da31103f8a39828d7861b1ae98ab5057df7a libxkbfile-devel-1.1.0-1.el8.aarch64.rpm 241c4553b7eff5d8861ece65637674b0f4365d84eddf5c7bca5e41a7762fbde1 libXvMC-devel-1.0.12-1.el8.aarch64.rpm f8bfe60eb3c2ba2563a36a17198cd8132c4fbf8690530bb747b2a7ae1eac3801 xorg-x11-util-macros-1.19.2-1.el8.noarch.rpm cc9c2966178ea156cd7345951bc4620e234bc546bddaedbb6ffdc59aa502aa64 xorg-x11-xkb-utils-devel-7.7-28.el8.aarch64.rpm 20f22666886d9014ca0a05d1b14379a8f1c7188ac07fcca929057c133ef49a42 RLBA-2020:4773 libgit2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libgit2-devel-0.26.8-2.el8.aarch64.rpm 268ae57f0529f7bcd507a675e0688f1f4df8ba1f30ee441d3184c223c3236754 RLSA-2020:4827 Moderate: oniguruma security update Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for oniguruma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Oniguruma is a regular expressions library that supports a variety of character encodings. Security Fix(es): * oniguruma: NULL pointer dereference in match_at() in regexec.c (CVE-2019-13225) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms oniguruma-devel-6.8.2-2.el8.aarch64.rpm 81f179af8b164e5e629f678746f876c1d4e3020c3da2b8ee0759b1df159824e7 RLBA-2020:4832 torque bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for torque. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms torque-4.2.10-25.el8.aarch64.rpm 6d3c084a7d443f19fe243c8f29614497bfd5b5095c40726b13f0c7654de0547f torque-devel-4.2.10-25.el8.aarch64.rpm fa38f4d2ce5272566d9c72004cd0af46b3fe59db4d7eccb59d2601fab8df1534 RLBA-2020:4834 new packages: gcc-toolset-10-systemtap GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc-toolset-9-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset is a compiler toolset that provides recent versions of development tools. GCC Toolset is an Application Stream packaged as a Software Collection. This enhancement update adds the gcc-toolset-10-systemtap packages to Rocky Enterprise Software Foundation Eneterprise Linux 8. For instructions on usage, see Using GCC Toolset linked from the References section. Components and specifics of this version are documented in the GCC Toolset 10 chapter. For detailed changes in this release, see the Rocky Linux 8.3 Release Notes. rocky-linux-8-aarch64-powertools-rpms gcc-toolset-9-gcc-plugin-devel-9.2.1-2.3.el8.aarch64.rpm 5fa7d0188c7a18facadf318e3ad521a7881a4aca6ee7e9990a19bbfba41b121a RLSA-2020:5393 Important: libexif security update The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libexif. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libexif packages provide a library for extracting extra information from image files. Security Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libexif-devel-0.6.22-5.el8_3.aarch64.rpm e7ba6cee81a8b9768a63dc4a5e87da987a776eed65d80c0f5499fe2ac0e39f1e RLSA-2021:1242 Important: mariadb:10.3 and mariadb-devel:10.3 security update MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for Judy, asio, mariadb, galera. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: mariadb (10.3.28), galera (25.3.32). Security Fix(es): * mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user (CVE-2021-27928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms__mariadb-devel asio-devel-1.10.8-7.module+el8.5.0+777+18007c86.aarch64.rpm cf505dedb0f59a8623402e4faef396217633715710cbe58ef949d1c3b2779a2b RLBA-2021:1765 brltty bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for brltty. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms brlapi-devel-0.6.7-32.el8.aarch64.rpm a6d62ffb9e55959c97698b4e4d7def2bef8e52a3a0033f2d797a39281a1369cf RLSA-2021:1775 Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-servlet-engine, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class (CVE-2020-1695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm 0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLSA-2021:1789 Moderate: gssdp and gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gssdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. GSSDP implements resource discovery and announcement over SSDP and is part of gUPnP. The following packages have been upgraded to a later upstream version: gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928) Security Fix(es): * hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gssdp-devel-1.0.5-1.el8.aarch64.rpm 1745159b79ada50f976c3adbbad26006067698a81bd9ee6ceb4b75a49c4751b6 gssdp-docs-1.0.5-1.el8.noarch.rpm bdafd56ed53b0ceea90602bba9e077c3c9ee44a7278f44e90814d74c8ca6ad8e RLBA-2021:1802 gnome-bluetooth bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-bluetooth. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gnome-bluetooth-libs-devel-3.34.3-1.el8.aarch64.rpm a7d6bfc6ce91eef7e95543f247950c9ff828683780988bf52f3213e5eaab0fc7 RLSA-2021:1811 Moderate: libvncserver security update LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvncserver. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Security Fix(es): * libvncserver: uninitialized memory contents are vulnerable to Information Leak (CVE-2018-21247) * libvncserver: buffer overflow in ConnectClientToUnixSock() (CVE-2019-20839) * libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference (CVE-2020-14397) * libvncserver: libvncclient/rfbproto.c does not limit TextChat size (CVE-2020-14405) * libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS (CVE-2020-25708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libvncserver-devel-0.9.11-17.el8.aarch64.rpm 84fefcd7b8af33b230572ed8144ef2222b605901f6aa1e80384c4f78668e7823 RLBA-2021:1848 dconf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dconf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms dconf-devel-0.28.0-4.el8.aarch64.rpm 34c1abe1e86ecd00e0c563624a4e384b152497147d9e3fb0efa4d9be7c1d4a8d RLBA-2021:1858 sendmail bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sendmail. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms sendmail-milter-devel-8.15.2-34.el8.aarch64.rpm 88b70c902ff88b631a2e9cc09e508bed32356952f8104b5d3bc7de8894493ef6 RLBA-2021:1902 uuid bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for uuid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms uuid-devel-1.6.2-43.el8.aarch64.rpm 5ae0a87cf13d0715fc43f8d7fa9021fab858b0e3d2238b8e3df9d27e63226882 RLBA-2021:1903 pulseaudio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pulseaudio, twolame. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms twolame-devel-0.3.13-12.el8.aarch64.rpm 053bbd7eb4b205a87ea99005bcf183deb6b5528c3dade77219329e87b56a37b3 RLBA-2021:1912 ilmbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ilmbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ilmbase-devel-2.2.0-13.el8.aarch64.rpm d542958699aa081830c29779d3202c2d97616a9d3d852a4bf37f3f48511d4700 RLBA-2021:1914 libsmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsmi-devel-0.4.8-23.el8.aarch64.rpm 6610118fc229d6f337a12fffd846b4dbab0c8a229d821b25b933b36286794b5e RLEA-2021:1919 new module: python39:3.9 Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This enhancement update adds the python39:3.9 module to Rocky Linux 8. (BZ#1877430) For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python39-devel python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.aarch64.rpm 637ec2d61a3f84c6a3c79abe7c5ffd13fd5b02ba0acb854b25fecd6e8edf0282 python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm 585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm 783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0 python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm 26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20 python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm 2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm 47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0 python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6 python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881 RLSA-2021:1924 Low: spice security update The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for spice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix(es): * spice: Client initiated renegotiation denial of service (CVE-2021-20201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms spice-server-devel-0.14.3-4.el8.aarch64.rpm 447055e1b7d90779f6ae72d39329caa23940f61c06716d8b5371909ecf471bda RLBA-2021:1942 ibus-typing-booster bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-typing-booster. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ibus-typing-booster-tests-2.1.0-5.el8.noarch.rpm 1ac4fe22dcf12bb14596745aaa355c043f2379e91c39347ff3c3833255db8179 RLBA-2021:1948 ibus-table bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-table. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ibus-table-devel-1.9.18-6.el8.noarch.rpm 5bc682aa187f8b6b8ce9d2bf0585b94cd324c8b97f3eb6aba7e125d09a0faafc ibus-table-tests-1.9.18-6.el8.noarch.rpm fc1d94b9f987c33e6ed095f0ccbc31b564362a7f806f479c1f2b559afa53cbad RLSA-2021:2363 Important: gupnp security update GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gupnp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GUPnP is an object-oriented open source framework for creating UPnP devices and control points, written in C using GObject and libsoup. The GUPnP API is intended to be easy to use, efficient and flexible. Security Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms gupnp-devel-1.0.6-2.el8_4.aarch64.rpm bccfbbf9c0b00cc129fedbdea11a20f75f3327a21e96aa78a9f8efe12f8e114d RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * PyYAML: incomplete fix for CVE-2020-1747 (CVE-2020-14343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms__python38-devel python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm 4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313 python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6 python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8 python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1 python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm 9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4 python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86 python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d RLSA-2021:3075 Low: libuv security update libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libuv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libuv-devel-1.41.1-1.el8_4.aarch64.rpm 6bbf153e378f816dd56229036eab5bb49495c64ba254b5fdef7f41dd35ed8cdf RLSA-2021:4160 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Information disclosure via pydoc (CVE-2021-3426) * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python39-devel python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.aarch64.rpm 637ec2d61a3f84c6a3c79abe7c5ffd13fd5b02ba0acb854b25fecd6e8edf0282 python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm 585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm 783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0 python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm 26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20 python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm 2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm 47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0 python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6 python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881 RLBA-2021:4180 evolution, evolution-data-server, evolution-ews bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution, evolution-ews, evolution-mapi, evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms evolution-devel-3.28.5-18.el8.aarch64.rpm 160a173056e2d96fa0352390a61ca83d3aaff33bea3bd48591db64fc6798cd03 RLBA-2021:4219 libinput and libevdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libevdev, libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libevdev-devel-1.10.0-1.el8.aarch64.rpm a7ff1a93aa3e55bdb6c611d7a339c89b0d47d60d631daf43b011750b436c35ee RLBA-2021:4224 libwacom bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libwacom. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libwacom-devel-1.6-3.el8.aarch64.rpm 00599d4e15c2e5f8990a4c342276af3c5d9fe57ab0f06bbfec8dcb6ecd242f42 RLBA-2021:4285 libvoikko bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvoikko. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libvoikko-devel-4.1.1-3.el8.aarch64.rpm 1c026b74e3c4a16b888eff60c715c8a8c6d68c2ea034ebe728c3f55b89b5fecf RLSA-2021:4288 Moderate: libjpeg-turbo security and bug fix update The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: Stack-based buffer overflow in the "transform" component (CVE-2020-17541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms turbojpeg-devel-1.5.3-12.el8.aarch64.rpm 5610aaabea7aa735fe03c5d92682eb19fdca152b5531935f1bbd675b7f82a803 RLEA-2021:4289 sblim-gather bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sblim-gather. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms sblim-gather-provider-2.2.9-24.el8.aarch64.rpm 50d0397b99581cfa39cda47bf7ff23d05049a2216cd607ae3b3a6ad419a56f8e RLSA-2021:4316 Low: zziplib security update The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for zziplib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() (CVE-2020-18442) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms zziplib-devel-0.13.68-9.el8.aarch64.rpm 72c80fe409252deb20805308f540e0383c072ef322b74bf3286d12d1419c1f08 RLEA-2021:4322 unicode-ucd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unicode-ucd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms unicode-ucd-unihan-11.0.0-2.el8.noarch.rpm 870061428ed38494e9a2d305b81fbd430429a6e5761f94caf6537f474b0f3bf0 RLEA-2021:4335 tesseract bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tesseract. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms tesseract-devel-4.1.1-2.el8.aarch64.rpm 8655d566fc5d0d054b85c8b6e470bedb4ad468259606990eb889e451a49a869d RLSA-2021:4339 Moderate: grilo security update Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grilo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grilo is a framework that provides access to different sources of multimedia content, using a pluggable system. The grilo package contains the core library and elements. Security Fix(es): * grilo: missing TLS certificate verification (CVE-2021-39365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms grilo-devel-0.3.6-3.el8.aarch64.rpm 656e62f99699d2a9df33d1f977e001c102525529538e52ab156ea7355d37ac1d RLSA-2021:4162 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-psutil: Double free because of refcount mishandling (CVE-2019-18874) * python-jinja2: ReDoS vulnerability in the urlize filter (CVE-2020-28493) * python: Information disclosure via pydoc (CVE-2021-3426) * python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code (CVE-2021-20095, CVE-2021-42771) * python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters (CVE-2021-23336) * python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS (CVE-2021-28957) * python-ipaddress: Improper input validation of octal strings (CVE-2021-29921) * python-urllib3: ReDoS in the parsing of authority part of URL (CVE-2021-33503) * python-pip: Incorrect handling of unicode separators in git references (CVE-2021-3572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python38-devel python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm 4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313 python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6 python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8 python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1 python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm 9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4 python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86 python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d RLBA-2021:4533 ibus bug fix update The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems. Bug fix: * Previously, in GNOME Wayland desktop in Rocky Linux 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly. (BZ#2014064) rocky-linux-8-aarch64-powertools-rpms ibus-devel-1.5.19-14.el8_5.aarch64.rpm 3add74552412d440d8c82d2c6f0c125789e9a9c8c628920b3b2c757ccf2dadd1 ibus-devel-docs-1.5.19-14.el8_5.noarch.rpm 67b3b057ac52c0ba48ad6774949daad44c1f1f14a2dbc5fafac3108532735d46 RLSA-2021:4585 Moderate: gcc-toolset-10-gcc security update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gcc-toolset-10-gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms gcc-toolset-10-gcc-plugin-devel-10.3.1-1.2.el8_5.aarch64.rpm e35680e5ad397a6e574e99b818be8e02c7fd2e1a44f6591e5a466e5e1768c718 RLSA-2022:0643 Important: python-pillow security update The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3-pillow-devel-5.1.1-18.el8_5.aarch64.rpm 6491d52a52cb495373090c90ee81c02d85adee6953096948733bb1a4c71d40bb python3-pillow-doc-5.1.1-18.el8_5.noarch.rpm 64ec44d65dab3eb5c18b94a53711ac2b79553ff54ec1c3aec07c94e9186ab63f python3-pillow-tk-5.1.1-18.el8_5.aarch64.rpm ad9d67a2d8db5b08af24dc4774159129d78f1ef37b72063613ac6dbb64cff9d0 RLSA-2022:1764 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python38 (3.8), python38-devel (3.8). (BZ#1997680, BZ#1997860) Security Fix(es): * python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391) * python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python38-devel python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm 4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313 python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6 python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8 python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1 python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm 9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4 python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86 python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d RLBA-2022:1770 evince bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evince. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms evince-devel-3.28.4-16.el8.aarch64.rpm a5a0b3bbf4821181fd2825face6d563f652cbbb9544a00847a374f3cc8370857 RLBA-2022:1790 libpinyin bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpinyin. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libpinyin-devel-2.2.0-2.el8.aarch64.rpm 596c414aea123caaf9c8268f418fba41810772bb12811be31e9c84a51dd4d71b RLBA-2022:1794 libmemcached bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmemcached. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libmemcached-devel-1.0.18-17.el8.aarch64.rpm 7cb2819f3cf4ee64a2ebdb6c5edfe77fd6f735ff3f7b55fae0006cbe8680d338 RLBA-2022:1800 accountsservice bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for accountsservice. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms accountsservice-devel-0.6.55-4.el8.aarch64.rpm bd7f5675377ea157ae393b9642feef8824d9dea87c7bbe104e9da92c4a035c4c RLBA-2022:1822 ibus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ibus-devel-docs-1.5.19-14.el8_5.noarch.rpm 67b3b057ac52c0ba48ad6774949daad44c1f1f14a2dbc5fafac3108532735d46 ibus-devel-1.5.19-14.el8_5.aarch64.rpm 3add74552412d440d8c82d2c6f0c125789e9a9c8c628920b3b2c757ccf2dadd1 RLBA-2022:1827 librdkafka bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librdkafka. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms librdkafka-devel-0.11.4-3.el8.aarch64.rpm c8b3275584e963d6099df5d85375a15f2d92f705ed36d4c2d06fa336d3019317 RLSA-2022:1842 Moderate: exiv2 security, bug fix, and enhancement update Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for exiv2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. The following packages have been upgraded to a later upstream version: exiv2 (0.27.5). (BZ#2018422) Security Fix(es): * exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS (CVE-2020-18898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms exiv2-devel-0.27.5-2.el8.aarch64.rpm a1948a702760e298396197624ddf5de8ad443e4c66ab9f251041d2614998b047 exiv2-doc-0.27.5-2.el8.noarch.rpm d2c75b50927dab8d284c052574cdd762ffe1c4debdc3c7c25d3b324f3626d998 RLBA-2022:1871 corosync bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for corosync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms corosync-vqsim-3.1.5-2.el8.aarch64.rpm c7cdf0b3e7b881f844bbffc595bfbc1a223a3adf47ff6a62843b490a898e3eeb RLBA-2022:1895 libecpg bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libecpg. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libecpg-devel-13.5-3.el8.aarch64.rpm f83edc444b2d82ca2a8cf88321e870a09fdc7063b0ecabe8f585ea5becbfb163 RLSA-2022:1763 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python39-devel python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.aarch64.rpm 637ec2d61a3f84c6a3c79abe7c5ffd13fd5b02ba0acb854b25fecd6e8edf0282 python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm 585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm 783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0 python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm 26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20 python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm 2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm 47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f python39-pybind11-2.7.1-1.module+el8.6.0+795+de4edbcc.aarch64.rpm 57a56a33a3460213a62048ebf84d265c3eea23799c2dbd0fc532ccce3044c5cf python39-pybind11-devel-2.7.1-1.module+el8.6.0+795+de4edbcc.aarch64.rpm b6adb9f1239d13fe2a17f26ec0245f1650f4b103b0d5eb8e5310e6058254443e python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0 python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6 python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881 RLBA-2022:1769 libgit2-glib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgit2-glib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libgit2-glib-devel-0.26.4-3.el8.aarch64.rpm 2579ed877e8b75ce137a05272b09fd9c2ced4b854d8a83842753d1fb32161568 RLBA-2022:1788 jq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms jq-devel-1.6-3.el8.aarch64.rpm adec350bf750693db6cadbd62fcb6d14eaa5595262ad4299bf5ddb7520deafd5 RLSA-2022:1808 Moderate: aspell security update GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker. Security Fix(es): * aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for aspell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Aspell is a spell checker designed to eventually replace Ispell. It can either be used as a library or as an independent spell checker. Security Fix(es): * aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top (CVE-2019-25051) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms aspell-devel-0.60.6.1-22.el8.aarch64.rpm e15dd4a12cb6b65f9890ae2297a8aacd132fa8db8efad8233c1a5ad9ec8f3d82 RLSA-2022:1820 Low: udisks2 security and bug fix update The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for udisks2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks2: insecure defaults in user-accessible mount helpers allow for a DoS (CVE-2021-3802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libudisks2-devel-2.9.0-9.el8.aarch64.rpm 5c7ecb5f2a36f0e2a2b480bcd6c65d805d6704e5bb158a6eb679fccf210587a7 RLSA-2022:1861 Moderate: maven:3.5 security update Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Security Fix(es): * apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools aopalliance-1.0-17.module+el8.3.0+74+855e3f5d.noarch.rpm fbb6c1c479c14f3cfd59b7ef1410cd4fd5d0e38a3b20d988d04626b9cc984b2c apache-commons-cli-1.4-4.module+el8.3.0+74+855e3f5d.noarch.rpm 45019b04925e7755a011ea89b09ea72f83c4084017f3937292afd4c5ceb0ac98 apache-commons-codec-1.11-3.module+el8.3.0+74+855e3f5d.noarch.rpm 3aa2b01dd5152ec46aa9671caf520795ba501397d983b795c13d44ff624e1610 apache-commons-io-2.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm 89e481e422ef99164e35d7211632853fcd0d4878369545985364dc50721254ab apache-commons-lang3-3.7-3.module+el8.3.0+74+855e3f5d.noarch.rpm 2a5f240d60dbc890037880b26f6611fc23dac46b8f50ae6ccaa149ee1cc5ed1a apache-commons-logging-1.2-13.module+el8.3.0+74+855e3f5d.noarch.rpm d789f181483d77171796dffad8e30470feac289a4034ee715731bbd6e1641444 atinject-1-28.20100611svn86.module+el8.3.0+74+855e3f5d.noarch.rpm e4b82afc0bb5526846c4eeb9cb79c26bce4d30934e1ced93d1d3e7307e074f74 cdi-api-1.2-8.module+el8.3.0+74+855e3f5d.noarch.rpm 2e8c720fdbc5e3482949b1de0b3eed0c2b7d8595a3ffabce476a6e1daa850018 geronimo-annotation-1.0-23.module+el8.3.0+74+855e3f5d.noarch.rpm e7b5122e8672fbe03fcb8fb36bceb4efb9a048fc2b3cd8fd0d7abb1557395780 glassfish-el-api-3.0.1-0.7.b08.module+el8.3.0+74+855e3f5d.noarch.rpm c4fc22d030b1a3a0f1b2465385e403e86f330d136a7c0eb0770d6cd26151763e google-guice-4.1-11.module+el8.3.0+74+855e3f5d.noarch.rpm df35552be68618d49606464e558fc5ba46b7700378df8925e57521f8eb3f98c3 guava20-20.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm 4b8a8bac2501f5672cfffe49ebd189b8b788b60d59c26f813dfd9c8f76fc2a2b hawtjni-runtime-1.16-2.module+el8.3.0+74+855e3f5d.noarch.rpm 4c65ddc64dbfc58c468643f55731d9dd50323a6f86ec3ab2d865671ccb7d7c7a httpcomponents-core-4.4.10-3.module+el8.3.0+74+855e3f5d.noarch.rpm 288373332ddbb4d44cbbc09a258f2ef678f9f82fcc675deb67fc1cf17e5433de jansi-1.17.1-1.module+el8.3.0+74+855e3f5d.noarch.rpm 91dc0aea768418adad49fd93dc91922be6e49f27ea74d2a6d8fcde0691999e1b jansi-native-1.7-7.module+el8.3.0+74+855e3f5d.aarch64.rpm 897f38e4749a81bb05c0c678d8ddb800d89bdab2ad06da19a644effb989c3547 jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm 1dfd33dda1d4c8109071d38142354c33ef297ad4481ae97ec23b228b0fe3f9d7 maven-lib-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm 186959635948722c4a8fc4e957e62a2f684f231cb2e8dad402ac4aee732c22ef jcl-over-slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm 3c363400689340b536e66c15f577a12a5b655144873247cae92fa1ab1d84c550 jsoup-1.11.3-3.module+el8.3.0+74+855e3f5d.noarch.rpm 3992d95096226f182c24e41a93e1d0df2eea9757c1ddf8e02869944dbd9d5a56 maven-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm 11eabb9b6ad822066845a124cd8fd58161bf8cea2bd30361d52b99f20bc532aa maven-resolver-api-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 78318ad89591627ff7b70d576dcfa7ddbd8b84cbc96bf10cfbfb3f00551f9d35 maven-resolver-connector-basic-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 8af445addb2ecf224118b43b189343bd81d61a7f1ed4919ba5e2a7b96884f094 maven-resolver-impl-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm d9efb68794c75fb6807690fa7b154010930804532539a082cf1f8c801987b002 maven-resolver-spi-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 84864ba6c437c4a79443cc8ad6709f1e3f4bef7805953b5593e7b7f85f112f4b maven-resolver-transport-wagon-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm c2ad084bdc61acc14f125e9dc97517c8b7bd1fe11f1fa51e0aa52bccae1104ba maven-resolver-util-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 50d2691f67b8937dc531975ac7b181b883dd480ff8ada2724efdbe55781271f8 maven-shared-utils-3.2.1-0.1.module+el8.3.0+74+855e3f5d.noarch.rpm 11617b79504bcb21ca362f90b50fe5a79c33f7e23a497c0f1f9fd72d875f14d5 maven-wagon-file-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm ae1861c6356a25f751701921f4bb4f6d4909e30f5f0a3992f29fb20d7d7d0efd maven-wagon-http-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm 5c23a755115e85f8a8244f0219d701ab4489ee8b0e342ffdbf5e3101d0b6c1a9 maven-wagon-http-shared-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm 317f893fc19cafca5ffba64667b11ce5f7b888b021b199b65dc4e05dccb9093c maven-wagon-provider-api-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm 72c219e7b417dcf9c0d653c51b912447866b9c54043c99e3076d81d789a642a1 plexus-cipher-1.7-14.module+el8.3.0+74+855e3f5d.noarch.rpm d15598cc6e72733579d36a2960e4fc6a5cee91f3822ec698df9d37be2890aa21 plexus-classworlds-2.5.2-9.module+el8.3.0+74+855e3f5d.noarch.rpm 4317743cf5f3c9405a29be7a128a157dcc35274d739a652244e3e81113202556 plexus-containers-component-annotations-1.7.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm cc34dedf623b784eeed97d1b32972ea29deba8822da85e125ee04f94c7283452 plexus-interpolation-1.22-9.module+el8.3.0+74+855e3f5d.noarch.rpm 2e23be2ec94ec5b6c7b655d396cfbc90ac035d22d81afc0cff2b18af207d1123 plexus-sec-dispatcher-1.4-26.module+el8.3.0+74+855e3f5d.noarch.rpm 827da035529b00c9fe3e940f5ddae520273c4b85d81df3f9be42dbfae3a0262c plexus-utils-3.1.0-3.module+el8.3.0+74+855e3f5d.noarch.rpm 00b359572d4dd27ba27a11a093533dc7eb15aa18417277d89dfb69426996aab1 sisu-inject-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm f9c004d055ccbec5294f396f757fba8589320c58d0be527c7703d39cfc4e6659 sisu-plexus-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm e6e9f0f557f06117e828215563eabe25c3e060d8f2929e1bb4ea142c14473d7a slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 RLBA-2022:1875 adwaita-icon-theme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adwaita-icon-theme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms adwaita-icon-theme-devel-3.28.0-3.el8.noarch.rpm 38a09e434c702743b2398bc56aac1f98b2f3bcf378e88ba7ec10569f1722ef1c RLBA-2022:1889 texlive bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texlive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms texlive-lib-devel-20180414-25.el8.aarch64.rpm 5db631dd1786b5247720949481d0819c9cb90c12fa3937939e7d6c4bbbb47fc7 RLBA-2022:1918 webrtc-audio-processing bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for webrtc-audio-processing. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms webrtc-audio-processing-devel-0.3-10.el8.aarch64.rpm 0b01ae10630afaf01db449e2d53dbe214f5bdf3e9e6daddc228c9fce50b1f9e0 RLBA-2022:1944 netpbm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for netpbm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms netpbm-devel-10.82.00-7.el8.aarch64.rpm 2b481333c4884deef0e9f42b37a88170a018c6195d0cac926307e5d8fe7ede34 netpbm-doc-10.82.00-7.el8.aarch64.rpm d4ca161c0a10bdc76a1191c148d1bce3000fbc1da6302ca10b2a1629c9bd7d00 RLBA-2022:1949 python-pillow update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-pillow-devel-5.1.1-18.el8_5.aarch64.rpm 6491d52a52cb495373090c90ee81c02d85adee6953096948733bb1a4c71d40bb python3-pillow-doc-5.1.1-18.el8_5.noarch.rpm 64ec44d65dab3eb5c18b94a53711ac2b79553ff54ec1c3aec07c94e9186ab63f python3-pillow-tk-5.1.1-18.el8_5.aarch64.rpm ad9d67a2d8db5b08af24dc4774159129d78f1ef37b72063613ac6dbb64cff9d0 RLSA-2022:1968 Moderate: libsndfile security update libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsndfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy (CVE-2021-4156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsndfile-devel-1.0.28-12.el8.aarch64.rpm f7dee0d5eb29717555856f293c5c254ed76836715169bba439fbe3bca031c650 RLSA-2022:4798 Important: maven:3.5 security update The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for apache-commons-io, atinject, maven-shared-utils, plexus-cipher, aopalliance, plexus-classworlds, glassfish-el, apache-commons-cli, guava20, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, jansi-native, apache-commons-logging, apache-commons-lang3, plexus-interpolation, sisu, httpcomponents-core, maven, cdi-api, jsoup, geronimo-annotation, google-guice, plexus-utils, slf4j, jboss-interceptors-1.2-api, maven-wagon, jansi, apache-commons-codec, hawtjni. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven. Security Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools aopalliance-1.0-17.module+el8.3.0+74+855e3f5d.noarch.rpm fbb6c1c479c14f3cfd59b7ef1410cd4fd5d0e38a3b20d988d04626b9cc984b2c apache-commons-cli-1.4-4.module+el8.3.0+74+855e3f5d.noarch.rpm 45019b04925e7755a011ea89b09ea72f83c4084017f3937292afd4c5ceb0ac98 apache-commons-codec-1.11-3.module+el8.3.0+74+855e3f5d.noarch.rpm 3aa2b01dd5152ec46aa9671caf520795ba501397d983b795c13d44ff624e1610 apache-commons-io-2.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm 89e481e422ef99164e35d7211632853fcd0d4878369545985364dc50721254ab apache-commons-lang3-3.7-3.module+el8.3.0+74+855e3f5d.noarch.rpm 2a5f240d60dbc890037880b26f6611fc23dac46b8f50ae6ccaa149ee1cc5ed1a apache-commons-logging-1.2-13.module+el8.3.0+74+855e3f5d.noarch.rpm d789f181483d77171796dffad8e30470feac289a4034ee715731bbd6e1641444 atinject-1-28.20100611svn86.module+el8.3.0+74+855e3f5d.noarch.rpm e4b82afc0bb5526846c4eeb9cb79c26bce4d30934e1ced93d1d3e7307e074f74 cdi-api-1.2-8.module+el8.3.0+74+855e3f5d.noarch.rpm 2e8c720fdbc5e3482949b1de0b3eed0c2b7d8595a3ffabce476a6e1daa850018 geronimo-annotation-1.0-23.module+el8.3.0+74+855e3f5d.noarch.rpm e7b5122e8672fbe03fcb8fb36bceb4efb9a048fc2b3cd8fd0d7abb1557395780 glassfish-el-api-3.0.1-0.7.b08.module+el8.3.0+74+855e3f5d.noarch.rpm c4fc22d030b1a3a0f1b2465385e403e86f330d136a7c0eb0770d6cd26151763e google-guice-4.1-11.module+el8.3.0+74+855e3f5d.noarch.rpm df35552be68618d49606464e558fc5ba46b7700378df8925e57521f8eb3f98c3 guava20-20.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm 4b8a8bac2501f5672cfffe49ebd189b8b788b60d59c26f813dfd9c8f76fc2a2b hawtjni-runtime-1.16-2.module+el8.3.0+74+855e3f5d.noarch.rpm 4c65ddc64dbfc58c468643f55731d9dd50323a6f86ec3ab2d865671ccb7d7c7a httpcomponents-client-4.5.5-4.module+el8.3.0+74+855e3f5d.noarch.rpm 8caedd5d895c3f289c37183e3fd8caea734fccb9e97de32f62c7c5828d1c400c httpcomponents-core-4.4.10-3.module+el8.3.0+74+855e3f5d.noarch.rpm 288373332ddbb4d44cbbc09a258f2ef678f9f82fcc675deb67fc1cf17e5433de jansi-1.17.1-1.module+el8.3.0+74+855e3f5d.noarch.rpm 91dc0aea768418adad49fd93dc91922be6e49f27ea74d2a6d8fcde0691999e1b jansi-native-1.7-7.module+el8.3.0+74+855e3f5d.aarch64.rpm 897f38e4749a81bb05c0c678d8ddb800d89bdab2ad06da19a644effb989c3547 jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+74+855e3f5d.noarch.rpm 1dfd33dda1d4c8109071d38142354c33ef297ad4481ae97ec23b228b0fe3f9d7 jcl-over-slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm 3c363400689340b536e66c15f577a12a5b655144873247cae92fa1ab1d84c550 jsoup-1.11.3-3.module+el8.3.0+74+855e3f5d.noarch.rpm 3992d95096226f182c24e41a93e1d0df2eea9757c1ddf8e02869944dbd9d5a56 maven-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm 11eabb9b6ad822066845a124cd8fd58161bf8cea2bd30361d52b99f20bc532aa maven-lib-3.5.4-5.module+el8.3.0+74+855e3f5d.noarch.rpm 186959635948722c4a8fc4e957e62a2f684f231cb2e8dad402ac4aee732c22ef maven-resolver-api-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 78318ad89591627ff7b70d576dcfa7ddbd8b84cbc96bf10cfbfb3f00551f9d35 maven-resolver-connector-basic-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 8af445addb2ecf224118b43b189343bd81d61a7f1ed4919ba5e2a7b96884f094 maven-resolver-impl-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm d9efb68794c75fb6807690fa7b154010930804532539a082cf1f8c801987b002 maven-resolver-spi-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 84864ba6c437c4a79443cc8ad6709f1e3f4bef7805953b5593e7b7f85f112f4b maven-resolver-transport-wagon-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm c2ad084bdc61acc14f125e9dc97517c8b7bd1fe11f1fa51e0aa52bccae1104ba maven-resolver-util-1.1.1-2.module+el8.3.0+74+855e3f5d.noarch.rpm 50d2691f67b8937dc531975ac7b181b883dd480ff8ada2724efdbe55781271f8 maven-wagon-file-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm ae1861c6356a25f751701921f4bb4f6d4909e30f5f0a3992f29fb20d7d7d0efd maven-wagon-http-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm 5c23a755115e85f8a8244f0219d701ab4489ee8b0e342ffdbf5e3101d0b6c1a9 maven-wagon-http-shared-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm 317f893fc19cafca5ffba64667b11ce5f7b888b021b199b65dc4e05dccb9093c maven-wagon-provider-api-3.1.0-1.module+el8.3.0+74+855e3f5d.noarch.rpm 72c219e7b417dcf9c0d653c51b912447866b9c54043c99e3076d81d789a642a1 plexus-cipher-1.7-14.module+el8.3.0+74+855e3f5d.noarch.rpm d15598cc6e72733579d36a2960e4fc6a5cee91f3822ec698df9d37be2890aa21 plexus-classworlds-2.5.2-9.module+el8.3.0+74+855e3f5d.noarch.rpm 4317743cf5f3c9405a29be7a128a157dcc35274d739a652244e3e81113202556 plexus-containers-component-annotations-1.7.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm cc34dedf623b784eeed97d1b32972ea29deba8822da85e125ee04f94c7283452 plexus-interpolation-1.22-9.module+el8.3.0+74+855e3f5d.noarch.rpm 2e23be2ec94ec5b6c7b655d396cfbc90ac035d22d81afc0cff2b18af207d1123 plexus-sec-dispatcher-1.4-26.module+el8.3.0+74+855e3f5d.noarch.rpm 827da035529b00c9fe3e940f5ddae520273c4b85d81df3f9be42dbfae3a0262c plexus-utils-3.1.0-3.module+el8.3.0+74+855e3f5d.noarch.rpm 00b359572d4dd27ba27a11a093533dc7eb15aa18417277d89dfb69426996aab1 sisu-inject-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm f9c004d055ccbec5294f396f757fba8589320c58d0be527c7703d39cfc4e6659 sisu-plexus-0.3.3-6.module+el8.3.0+74+855e3f5d.noarch.rpm e6e9f0f557f06117e828215563eabe25c3e060d8f2929e1bb4ea142c14473d7a slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 RLSA-2022:5331 Moderate: libinput security update libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libinput. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libinput-devel-1.16.3-3.el8_6.aarch64.rpm bde3d4d77bd661d9256d7f2dec8e7353274f7b5eeafbf0673704413b022668aa RLSA-2022:6911 Moderate: .NET 6.0 security and bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el8_6.aarch64.rpm 5bd2d0f4ec1d3b7afde4d718fc4477b62eafffd021c77b619c7a5ca0b3de46db RLSA-2022:7006 Moderate: java-1.8.0-openjdk security update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm b7d35d9f285a1b0dec58da3c3f4a0ffc7ebc591e4153249ebdccc04dd2a9d790 java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 18d16f2d145b0a74d9c5708123ebc80234856f31d9b12140ffad3f696018a54a java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 19365b81c215dbecc57340be70effc577928ce7e948433336c1ee582bac02acc java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 647d993682f191b54be44e034069c6b7c440095f92b6e9fb7570a0739577e108 java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 70d11b21564ba0f9687a7ecffc2d7dd9f86fe6b1a875e3ffa57d3fa9f7708815 java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 320d6c5f7d96eed48a774fb425120467c3de9d3b7dee221671acc71d649892ea java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 9d00ba06ee69c2f9777b452d779a8173ca4b3b5ee2e550359b6093ca0596de16 java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm a551632ab45c43f2264420ffc7910ec143bb2b9b6d9311ea2ce9556630dee26f java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 0fff96db56187df2caf62c76b6dfc2991037ff451380ea4e519df9e1f4f6f2e6 java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm e59b364a29f07f98415d5cd0279e46427b44814318240ab114b8f0a7becaf884 java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm fcc84852a012c72513ec52f6a95f336c04b1eef97d9378d23839a1061cf52ce2 java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm bc1bd795a4363451df05af031f89c05069f40dcdcc3ce17b6bb42ffbf629846c RLSA-2022:7000 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-8] (BZ#2132503) rocky-linux-8-aarch64-powertools-rpms java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el8_6.aarch64.rpm ea2fa9620d5fdf59ec35ae91c3a9504a1cc5945df7f5388b85b62a6acfb08591 java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el8_6.aarch64.rpm b82445472ba4c355bb43a735b0e30b3de4f1a1b0cb62d4629ffe43674000da00 java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el8_6.aarch64.rpm e7f53aacf380aecdc96d775b484133b1af4f3048155085469b3b01bc7ca21883 java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el8_6.aarch64.rpm dfd70437d7de24c2cfb5a737bf268a53498ede87755d67e0e604e0782364cb6a java-17-openjdk-fastdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 85886a5ec04b03a76028a2ff29eacff6fe1b38fcce02cd752865a11a534fabd0 java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 6b589a87fb9877b12254dffb2788d0535c0318bc2706255cc39fa52c0e883f5d java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 590a2d579c7cca0c42f90f87b0778917ab4e85d16f996095e66c669b60a4d393 java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el8_6.aarch64.rpm f99f1112311b2ea10a2ab159169aafc99024148a3c550858386c33e48606d76f java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 12e71a0739f2651eab6357b88dfbd2f1f5d00d7261067d91b5afc226e1a55eb7 java-17-openjdk-slowdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 81fc3ea1aa495edba990c8a40d4889f92ac663b7e6a38d225984001285d9826f java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 4c02eee746e86de7064e85f96ce143453e339343e3f4446fa7a5d33683b51ff3 java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 5f9a40ef8d1835b293d0f2d21390925e7f160b80860d08ced51435da53664521 java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 630abef35a85663ce5d1ca20cfd7674e5a57376ebe66e0e1577bad6cf38e464b java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el8_6.aarch64.rpm 88046dc62168e0752eae3ff58f9e9dc281c5f80011e22b3f035328e67c7e6112 RLSA-2022:7012 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131863) rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 0bfd462430a0f2a197344437990ca4c4cddbf4801a025ba68490251c059f2b9c java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 44d82fd903f9044363c769ac67c54e3ba29b63eb7023490c90d6ad6033a74027 java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 048bd77ac5d000a7ac12aa6764037c8d824686a1d739803490e76fc41beaaaa6 java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el8_6.aarch64.rpm f5b22c4c67bbf09fe53dec2a689bf2c0007c45669c1b8205282c62d21d9aefda java-11-openjdk-fastdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 5a49f541ab8316e6de735f127d15569119366344541c559a99bafc6dbbac4565 java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el8_6.aarch64.rpm e53e9eac134a9bc218ba00e13a3abb8cf62cd9733d0671d47d47e51f494d6781 java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el8_6.aarch64.rpm d2323f8f91e658b75750ad32efe2df128498c09724f136b0b0c1bed8a79b4ca6 java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 1ed54f93628722340771739421d20bf0c65e8573fd5c475ce00ed6f418b778fc java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 2124bfd6883f11639b573a6b47db4edb6c703621a2064190689603bbc8c7cbfb java-11-openjdk-slowdebug-11.0.17.0.8-2.el8_6.aarch64.rpm da5092b2bc4e5a0dec9a3b8145cb97a8c9cf9d35a3fb940baa8706749cd7c8ef java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el8_6.aarch64.rpm c02b7a506c3bd44e51299ac15aa5373977468de268da4d50bbe1e2e1926fd3fc java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 58fb748ba017d249d22412f3a377ee5b3567a97fbb4f0978664eb8eaa532fb23 java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el8_6.aarch64.rpm 5d4bbc78bc56cf20ffac042dbc71e38bbf98c9351817e9fbe1d95603e876b9e0 java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el8_6.aarch64.rpm f88af1e194e7f3bf235c1cf902a7a5511d6ecebc19ff9c3dabf75bcb4222e885 RLBA-2022:7459 flatpak bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for flatpak. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms flatpak-devel-1.10.7-1.el8.aarch64.rpm c7235062a1e914f8c93b79d81dd06f4b7c559403309f9deb50be92f6370490bf RLSA-2022:7464 Moderate: protobuf security update The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for protobuf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms protobuf-devel-3.5.0-15.el8.aarch64.rpm b6fe0e2fd888fa9462acda19a8f750731cf7f5aeb6b4137e82a3ff4dec49cce0 protobuf-lite-devel-3.5.0-15.el8.aarch64.rpm 91bd7b661b1a51403db5daa2f455e83a68c8d6293e9af269139a5427293d80b7 RLBA-2022:7465 nmstate bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms nmstate-devel-1.3.3-1.el8.aarch64.rpm 09b526f1ba5a2eccee4c21d63cfe373c74914bf0e4093c446e32df0497123e9c RLBA-2022:7468 libnma bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libnma-devel-1.8.38-1.el8.aarch64.rpm fc78208f60388d2835d2771c2f541659c998d66ce87cbf2dcc470e1ab5fb4280 RLSA-2022:7470 Important: pki-core:10.6 and pki-deps:10.6 security and bug fix update The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for jackson-core, ldapjdk, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, apache-commons-net, xmlstreambuffer, jackson-annotations, jackson-databind, pki-core, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, tomcatjss, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jss, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__javapackages-tools apache-commons-collections-3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm 1962d12108c85c26d6c44584c3414afa93177a62fe5fe31b9cb6fff51cd75cb9 apache-commons-lang-2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm 2cd3cc1c2c68b00eaf7073efe0e649c14d4cbeee76322fca4dbfe239a65e1d29 apache-commons-net-3.6-3.module+el8.3.0+74+855e3f5d.noarch.rpm 0fd615658b7f48a1545a730d3142ba3c125727c552f69733e20d0c75633e7743 jakarta-commons-httpclient-3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm f71217b74ea2188f28ebd2b0d2f6677a94709d3e2ebbf4d02b333905d6c15b1e javassist-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 825f8edc1944e27c4611567fcb91aca046ba7994e92c1c9c215d2d83124920e0 javassist-javadoc-3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm 8da2a537026464a73387891f3983170d6049e939815a754e56afd4822208c687 slf4j-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm ccb1053be94370d918f0d931da4129bcc3dea1a5fd5a8bdb2786f45297e4d777 slf4j-jdk14-1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm d9f73b25226e215f33eb7cb543ec0a7104fb91911fee655ed0c58ad11f10e7e3 velocity-1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm ade96d58f90efb5525b69336ef4b52e440d0f45532c0118e21805e9a925351a8 xalan-j2-2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm 10e75783a7ccfc438619489e7884709106c0989b344098087c8c203d1661edd1 xerces-j2-2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm fa10d9d0fc58d7b35ba8f873c84601f9362239a8016987f7965f72d099e8bf78 xml-commons-apis-1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm 275a59ebebead1b5939045d1d662ce6f5b273ce28d6fc7211d9e4e0a468d3630 xml-commons-resolver-1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm aaa1426f9361c3acd22134b8e459735af876af2716471524233b9ab02e98a522 RLBA-2022:7471 libestr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libestr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libestr-devel-0.1.10-3.el8.aarch64.rpm 37abc0b20d075c39066ca3795fad7c9ae0c3ac0cd8a35256af231cd99d559ef8 RLBA-2022:7481 python-qt5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-qt5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-qt5-devel-5.15.0-3.el8.aarch64.rpm 13528a03d8033ab2ad3a56f4f6da30acfc70c785ecebb11b76c66a95fee49f63 RLSA-2022:7482 Moderate: qt5 security, bug fix, and enhancement update The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377) Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for qt5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. The following packages have been upgraded to a later upstream version: qt5 (5.15.3). (BZ#2061377) Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-devel-5.15.3-1.el8.noarch.rpm 87cf5f9cb20eff95e0e51a8f3ab82a3cb7191d6dbde6fce6e30d7f9f1c94290c RLBA-2022:7487 qt5-qtbase bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qtbase-static-5.15.3-1.el8.aarch64.rpm 8bcb5111814f8310415b2090162f38f2400288218da98284294ddead29882542 RLBA-2022:7490 qt5-qtdeclarative bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qtdeclarative-static-5.15.3-1.el8.aarch64.rpm 131664c43d738c1c7a41ba9ca6a60562df1f4b05ec94357e2d63a0d83c9e019e RLBA-2022:7495 sip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-sip-devel-4.19.25-1.el8.aarch64.rpm 29645e6f340bb0dbb905ef636e9ca03c5961ca45eef9ce690d6a3d3cc60c7832 sip-4.19.25-1.el8.aarch64.rpm f149b5742bf77733dc4a740512e7ede6fc67d53322ace9c708505813f4285005 RLBA-2022:7498 qt5-qtquickcontrols2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qtquickcontrols2-devel-5.15.3-1.el8.aarch64.rpm 3ba93d954fb561785c5f883d5c0071937537c1b5e7a815b044eea281f123cd32 RLBA-2022:7501 qt5-qtserialbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qtserialbus-devel-5.15.3-1.el8.aarch64.rpm db10173970e2dfa3ba6cd61cfe1d84f75e0d340d9e64c811f1c7498bdfacdb45 RLBA-2022:7504 qt5-qttools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qttools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qttools-static-5.15.3-2.el8.aarch64.rpm b117b12723ba7771f8dfc72f4666d7a78497dd7c41496e0097e138b18334b459 RLBA-2022:7506 qt5-qtwayland bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qtwayland-devel-5.15.3-1.el8.aarch64.rpm 0f7e0c3d56d40b3d626d9804bb6b7c9e7830f3b5e77197155713ffff24f6ee2e RLBA-2022:7515 papi and libpfm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpfm, papi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libpfm-static-4.10.1-5.el8.aarch64.rpm ff79c990b2eb8667692b376106a95a48257cd10acd73b22afa338b70ce744c29 papi-testsuite-5.6.0-16.el8.aarch64.rpm 82269cd4fb424ccaf75bcdfae576fc11c3c5735ecb4a75c7ceeac13eed1157ec python3-libpfm-4.10.1-5.el8.aarch64.rpm 63f5c49e106e2358d2d16b788c086aede1fa941ca15a3cb455d9757d2a41c6be RLBA-2022:7518 dyninst bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dyninst. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms dyninst-devel-12.1.0-1.el8.aarch64.rpm 1a8d904eb105a235bc77cd6098447357c42f0614d5ee595919e421250108c3ef dyninst-doc-12.1.0-1.el8.aarch64.rpm 6dd34df92943d3d650be2a12667c87ebd607b50dba2439272d9cbd72579bdf81 dyninst-static-12.1.0-1.el8.aarch64.rpm 27b638ad8f18faca3f7e2e53c518886e0805dae51152c805ddbdc22cdce3aaa7 dyninst-testsuite-12.1.0-1.el8.aarch64.rpm ee74e728780b1d9f046476770488b1c9e8c56b5a9022fd1ed02fac4b1bdd12b8 RLSA-2022:7524 Moderate: yajl security update Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for yajl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms yajl-devel-2.1.0-11.el8.aarch64.rpm 0ead758ab7b0f236e0a814bf4751e83a9583e1ab2f8f3a5cb9410fc408890dff RLBA-2022:7531 evolution-data-server bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms evolution-data-server-doc-3.28.5-20.el8.noarch.rpm 7bcaa23e44e2feee8abadd9a231b1d4d64a0b5f5d802a429bc2715a95e07a0e1 evolution-data-server-perl-3.28.5-20.el8.aarch64.rpm 8e436e4b34f0b6659c09e8643a24127e570c62ace7fe6bc582f025c65ac0e218 evolution-data-server-tests-3.28.5-20.el8.aarch64.rpm 16ee72aed8c1870f09ca92d71929d12cc336bbce02efc6af66a8c3d36dfa34ef RLBA-2022:7536 nautilus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nautilus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms nautilus-devel-3.28.1-21.el8.aarch64.rpm 0c08f730a29a9d017024c4fadf8b92556ddbfda7dc69d5901e59ae2af1f9e372 RLBA-2022:7559 lasso bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lasso. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms lasso-devel-2.6.0-13.el8.aarch64.rpm f6ef40563d46e867b4927b85565b77812fa472e04680ea09a6d941f5471e2436 RLSA-2022:7558 Low: wavpack security update WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for wavpack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WavPack is a completely open audio compression format providing lossless, high-quality lossy and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms wavpack-devel-5.1.0-16.el8.aarch64.rpm 877e3ccc2818bde9fd8d7f03beb379944ac28e76f5efb339b641a556a778e8ea RLBA-2022:7561 crash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms crash-devel-7.3.2-2.el8.aarch64.rpm 02367c77f1e1f8fddd549898d7f36bc4ad0b1b2c16d7900a08d9bda95a8237a5 RLBA-2022:7564 gdm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gdm-devel-40.0-24.el8.aarch64.rpm cfc9e8b37a4ca03f325b47d3885b01c1552e4bebe0a050ff936f8326580a6636 gdm-pam-extensions-devel-40.0-24.el8.aarch64.rpm 6a2dc5291bf7b3c5554f658f181016c4516b5161aafe1859ef492d02cd49aa26 RLSA-2022:7581 Moderate: python38:3.8 and python38-devel:3.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-urllib3, PyYAML, python-attrs, python-jinja2, python-requests, python-atomicwrites, mod_wsgi, python3x-pip, python38, python-asn1crypto, python-chardet, python-markupsafe, python-pluggy, python-py, Cython, python-psutil, python-wcwidth, babel, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python3x-setuptools, python-cffi, pytz, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python38-devel python38-atomicwrites-1.3.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm 4577930f8643eab6d5dd7d0f768cde32fcd2c7a4384f0b1cf913f2cca6713313 python38-attrs-19.3.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 1045c38f448778b2e636bd48607abc9b8cb9d767fb254f02d8fc4446de2dcdb6 python38-more-itertools-7.2.0-5.module+el8.4.0+570+c2eaf144.noarch.rpm a835104b763c20cf7aa64b8508e9c0b5cf39fa6a150327a3203fdb0a8755bdef python38-packaging-19.2-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0edfb62f3f6eaa6d37cf69560eb66c4e7321fbe4d5b1a5a2cf836aa1195311be python38-pluggy-0.13.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm 60dfc6122c9fd333025780bd3d6277083526e0932eb444ce6713be3f54a743d8 python38-py-1.8.0-8.module+el8.4.0+570+c2eaf144.noarch.rpm c2a1b7e33d1d1cd09325d09c9297065b85587adeaac0d805927036daae1681f1 python38-pyparsing-2.4.5-3.module+el8.4.0+570+c2eaf144.noarch.rpm 9764b2d4672b7d858a173b448213904a8eb16937add8a417987a31c3857ae7f4 python38-pytest-4.6.6-3.module+el8.4.0+570+c2eaf144.noarch.rpm 0369a5e14d4cbfd676ebd6157f0b988a1b9e2480e9fae9c00291b7c1d73abe86 python38-wcwidth-0.1.7-16.module+el8.4.0+570+c2eaf144.noarch.rpm b9652f15c965a3ec2e00be8240a592c91cdeb727b316863a34944a4de723859d RLSA-2022:7583 Moderate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xorg-x11-xtrans-devel, xorg-x11-server-Xwayland, xorg-x11-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms xorg-x11-server-devel-1.20.11-9.el8.aarch64.rpm 653a4590a91bc0828bc645f87aa0e6ca25ed7d084d7fca25546f5160d6ad36f5 xorg-x11-server-source-1.20.11-9.el8.noarch.rpm 3f465e1af2b55d00046615a3cc9113a0b6f600ddfce17d74e286218782f4b823 xorg-x11-xtrans-devel-1.4.0-4.el8.noarch.rpm d59bbc4e1c42e0203d582e8825b3751c20cddca6a30b1dab48fbe5591f0c2daf RLSA-2022:7585 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561) * libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562) * libtiff: reachable assertion (CVE-2022-0865) * libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924) * libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355) * libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844) * libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891) * tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908) * tiff: Divide By Zero error in tiffcrop (CVE-2022-0909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libtiff-tools-4.0.9-23.el8.aarch64.rpm db24b77d8946476a17964f518bdb9f9c97b66732bfcbd5744dde58905ba6fea8 RLBA-2022:7589 yara bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for yara. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms yara-devel-4.2.3-1.el8.aarch64.rpm 23d29c346cc8acfd85441ac000a68c3f1f0b6bb32c186dc210cc54d5b8516fa1 RLSA-2022:7592 Moderate: python39:3.9 and python39-devel:3.9 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-more-itertools, pytest, python-psycopg2, python-lxml, python-PyMySQL, python3x-six, python-toml, python-urllib3, PyYAML, python-attrs, python-iniconfig, python-requests, mod_wsgi, python3x-pip, python-py, python-chardet, python-pluggy, Cython, python-psutil, python-wcwidth, python-ply, python-wheel, python3x-pyparsing, python-pysocks, python-pycparser, python39, python-cffi, python3x-setuptools, pybind11, python-cryptography, scipy, python-idna, numpy, python-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms__python39-devel python39-attrs-20.3.0-2.module+el8.4.0+574+843c4898.noarch.rpm fbb8f663205787752f8a7c5a1a7dc1497d9de97321946c2f1f959b9a83e701ba python39-Cython-0.29.21-5.module+el8.4.0+574+843c4898.aarch64.rpm 637ec2d61a3f84c6a3c79abe7c5ffd13fd5b02ba0acb854b25fecd6e8edf0282 python39-iniconfig-1.1.1-2.module+el8.4.0+574+843c4898.noarch.rpm 585177d17ab59aafa2b84d8543a424a37d750a1b7d77b13d3528fba480b8178f python39-more-itertools-8.5.0-2.module+el8.4.0+574+843c4898.noarch.rpm 783f58ba2a8c29a6be5ff43e198e37fd6a63251db3b3f2bee347fab0fb814ed0 python39-packaging-20.4-4.module+el8.4.0+574+843c4898.noarch.rpm 26959ff9006b14a57368c87762d0330e3fbfea6f3e3a635a8b19b3cf935a4e20 python39-pluggy-0.13.1-3.module+el8.4.0+574+843c4898.noarch.rpm 2f8e19389c1dae284619279fe0e20688debb67181df429c7d1ca16ba88747fda python39-py-1.10.0-1.module+el8.4.0+574+843c4898.noarch.rpm 47b83d280a2e2d2082f269fe5971adb5e2baa0d5e53e67492a3471a844b8691f python39-pybind11-2.7.1-1.module+el8.6.0+795+de4edbcc.aarch64.rpm 57a56a33a3460213a62048ebf84d265c3eea23799c2dbd0fc532ccce3044c5cf python39-pybind11-devel-2.7.1-1.module+el8.6.0+795+de4edbcc.aarch64.rpm b6adb9f1239d13fe2a17f26ec0245f1650f4b103b0d5eb8e5310e6058254443e python39-pyparsing-2.4.7-5.module+el8.4.0+574+843c4898.noarch.rpm c30232fe2b752fc55b6f9baab39b970d7b5b95cb01abe8cf91ccea9bc0846dd0 python39-pytest-6.0.2-2.module+el8.4.0+574+843c4898.noarch.rpm c2f636f758cd74bc1b9a16e1f42561af64af41cbfc5e7179fd204565ad051cf6 python39-wcwidth-0.2.5-3.module+el8.4.0+574+843c4898.noarch.rpm be221a900dcb8cf7ac2f7e5660522a057fd7c0b08503b9b4ed19d9564716c881 RLSA-2022:7594 Moderate: poppler security and bug fix update Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for poppler. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms poppler-glib-devel-20.11.0-5.el8.aarch64.rpm a687d84fe81cdd580892cd4d621a11da7c8b538373c00ba6cee275d50bb011ac poppler-cpp-20.11.0-5.el8.aarch64.rpm e555996db19fdb26407079440b3276b8fd8c06efdfd6cee6dbbdf9eb6d1af4a9 poppler-cpp-devel-20.11.0-5.el8.aarch64.rpm 15887778f889ec8c12b2ea97e2f1a97f3448721fb92f33103092deaa5722c9fa poppler-devel-20.11.0-5.el8.aarch64.rpm badae6f3964c77b1889fa60f9da52df8e7952b032a54d54f251d6960e0cf7a06 poppler-qt5-devel-20.11.0-5.el8.aarch64.rpm 231d620ab952a12cc55f2aae0a681dd4aeb7ac630e6cc2f895fdc3521864a3df RLBA-2022:7595 bcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms bcc-devel-0.24.0-2.el8.aarch64.rpm 65208000b6381ffcba98bcba6b029052a245ecfd8c88c0fc2cb2d12945b60587 bcc-doc-0.24.0-2.el8.noarch.rpm 68ec3588aaefcfce81f7a7e1de97007ca70673e6a1eea83584fcfd7e34c969fb RLBA-2022:7600 boost bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boost. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms boost-build-1.66.0-13.el8.noarch.rpm b55abb54da2283abaa0c6253aeb6df7706152ce702492c34f504e25cd31de932 boost-doc-1.66.0-13.el8.noarch.rpm bef5031eb15715588ba45b1fa0062da8652663029f75c9d0b94b7a4bb5b3aad2 boost-examples-1.66.0-13.el8.noarch.rpm ede1620a32a2a69de585e91b93eb2dc742fae2e70ce793c5c38346eec58cfac3 boost-graph-mpich-1.66.0-13.el8.aarch64.rpm 1cd6cb3880b0f4873f388f3c4bdf3dfd5646dbb471465fbe2f51cab29a98e4c0 boost-graph-openmpi-1.66.0-13.el8.aarch64.rpm 2ef6c16f663ef20125137858b759549b37e4d69553e078c7c4053b15168153a5 boost-jam-1.66.0-13.el8.aarch64.rpm eeb110538b3714e32b6d6753a2a8be98cfcf8f0213f2ba10bbb16cfd7ef52717 boost-mpich-1.66.0-13.el8.aarch64.rpm 19d3e04865cbf2481f1442b356ccd346130fd50c2230798e94749620768aed1c boost-mpich-devel-1.66.0-13.el8.aarch64.rpm 12765e2dc004c3edf09057cac6df591d724b0e0460b968e36ba3819db80e2871 boost-mpich-python3-1.66.0-13.el8.aarch64.rpm 8480324e00396c5c365c79a430c17e8b657f98088379f54b11912a611a91d810 boost-numpy3-1.66.0-13.el8.aarch64.rpm 51c09f941fb419f45df5232e54464cee730428def60cebc43d29ab3bebaf1d8c boost-openmpi-1.66.0-13.el8.aarch64.rpm ec115b2a96b6fa1d801db761d378a72b470ff3a818b4c2b6367b054c9123cc71 boost-openmpi-devel-1.66.0-13.el8.aarch64.rpm d624c10c050f52aea3409b81ea8d3eb32be7271a8a45634dd0226bbaa0ec97d3 boost-openmpi-python3-1.66.0-13.el8.aarch64.rpm fcac33cbee23efa4e85ba93984907bca50446526cb93335a642c34b6107fb797 boost-python3-1.66.0-13.el8.aarch64.rpm f9f86c2a5a1fe7fd766b3893da9f2a5fdd4b23dbd1807281bb5eac52918f5271 boost-python3-devel-1.66.0-13.el8.aarch64.rpm 5934e3f54190f365eaec0e87b79486311ef40f28ce685d86dc8f0c2fb31887fc boost-static-1.66.0-13.el8.aarch64.rpm 7ce65907b8701cd345f13f4ec4d4002f4ab88fd0af78b7c4819c8398f91b3fef RLEA-2022:7601 libdrm, mesa, and wayland-protocols bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wayland-protocols, libdrm, mesa. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms mesa-libgbm-devel-22.1.5-2.el8.aarch64.rpm 73d16528ddf32211f9e710c61f6f8fca731f89943655427d63f33dd0a1d7692a mesa-libOSMesa-devel-22.1.5-2.el8.aarch64.rpm 95e63a3c63c09fa660fa842bcb9ddb70ff7204e1707d66b4db8b64076b241619 RLBA-2022:7614 xxhash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xxhash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms xxhash-devel-0.8.1-3.el8.aarch64.rpm 31a943cd2ec4a0b6991f574ed9d8382e26a7429b8d8bca5e8201b1bdbef56cb4 xxhash-doc-0.8.1-3.el8.noarch.rpm 68b481dfb90bc6128f2f6e11cde7157f7f30422bdde8f464dc49539ef75494cd RLSA-2022:7623 Moderate: dovecot security update Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dovecot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms dovecot-devel-2.3.16-3.el8.aarch64.rpm dcc4ac93e85a6558c76a805b31e7920d5fc0e8bc0a1793df483a419d925c5280 RLBA-2022:7631 ghostscript bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ghostscript-doc-9.27-4.el8.noarch.rpm 63caef3cf225a40dc30d6c8349e4f999d43d38e4b30a71a600dc0eaf90b697b2 ghostscript-tools-dvipdf-9.27-4.el8.aarch64.rpm b66ab65b846373eacf9e3ce210e8b3a70bd8461946a14657b3528e6b0c7be604 ghostscript-tools-fonts-9.27-4.el8.aarch64.rpm fbc4469c9613607db5e43a666b1293eccc337045d783c22bde99360724ab3900 ghostscript-tools-printing-9.27-4.el8.aarch64.rpm 423cc0e059d6ef21513986df102c100f98b1dccfe005e3a96947cfc7ca8edc6b libgs-devel-9.27-4.el8.aarch64.rpm 0a65401dea9547b396e917e8ad7fc7556bf418547333ac08df9580037efc7672 RLSA-2022:7639 Moderate: openblas security update OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openblas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenBLAS is an optimized BLAS library based on GotoBLAS2 1.13 BSD version. Security Fix(es): * lapack: Out-of-bounds read in *larrv (CVE-2021-4048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms openblas-devel-0.3.15-4.el8.aarch64.rpm 33aa3c49a45f273406d61d77c6b57d67a0761d4862de5eb08d3869d0c4465a59 openblas-openmp-0.3.15-4.el8.aarch64.rpm 1a00bf04d6c9a656cf403ec2bc1c10170bd1687c7405767f119c3d646175e568 openblas-openmp64_-0.3.15-4.el8.aarch64.rpm 0d715a815f22ee12146649b7ec4757b72ad7f9dbfda6ce51d8091bf65425e921 openblas-openmp64-0.3.15-4.el8.aarch64.rpm f4bc9d985b0ee822e72178609053162acae57be4280ae7647a70a9f5a02b2b63 openblas-Rblas-0.3.15-4.el8.aarch64.rpm 82770ef574c11659990de8f57170ec733045b8c26781d19b6ea5a4117561d2cd openblas-serial64_-0.3.15-4.el8.aarch64.rpm a75be6d79eb93af81c72aca5cae93b7ff47697338287a22a50b4418b79a7affc openblas-serial64-0.3.15-4.el8.aarch64.rpm 17b229fae5baeed538da874b4bf5d0bdbe0578f8686e6445ab24cdd278804bb1 openblas-static-0.3.15-4.el8.aarch64.rpm 7bd6f43f90b37da04ae54a63a7aeaa9604836fb2b2f731d7f0ef1350da9a5a20 openblas-threads64_-0.3.15-4.el8.aarch64.rpm e51c0725e14ae454d73913249dae557a5ea7113ac5c636a13a9a06d59f8d2a78 openblas-threads64-0.3.15-4.el8.aarch64.rpm 9e6d05e8fadaef9bf2240c138f350fb9100770232674eff9c72e50e4a8c9f609 RLBA-2022:7641 fstrm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fstrm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms fstrm-utils-0.6.1-3.el8.aarch64.rpm 7cbe9801e2001e028544b213f20210cc3411dabfa2c551bad620256c78f25595 RLSA-2022:7643 Important: bind9.16 security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind9.16. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms bind9.16-devel-9.16.23-0.9.el8.1.aarch64.rpm 8f5b735830df77f937084df2c692b0cca2d5952e08c9447912ed574cdad04fa4 bind9.16-dnssec-utils-9.16.23-0.9.el8.1.aarch64.rpm 64020cd9f65a95de49d6f1d1bf50c26d6587ecf824bd2174101e12087dd17786 bind9.16-doc-9.16.23-0.9.el8.1.noarch.rpm ef26712cfaaae27376f5e0ec5f4f2d57804ea16ce3668997d15a50ea6698106a python3-bind9.16-9.16.23-0.9.el8.1.noarch.rpm ca260ea4c3d4b4ea57741b6ceb3ff53bc81c9437d67e502f2cb5013ec596688e RLSA-2022:7645 Low: openjpeg2 security update OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for openjpeg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms openjpeg2-devel-2.4.0-5.el8.aarch64.rpm 9fcb4ad792d52f614e8212966dbe933b46a259e03f8f02cf92671453edcd5cc6 RLBA-2022:7646 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libblockdev-crypto-devel-2.24-11.el8.aarch64.rpm cb14c1f82e01f1371de7591977a41c114135cff1745cc17dfd7ca9c2d480de8f libblockdev-devel-2.24-11.el8.aarch64.rpm 18b97b9d72772bba6ecaa8816bbce22a64925876ce8c0c9506d3b5d4722be889 libblockdev-fs-devel-2.24-11.el8.aarch64.rpm a43a737349195369e421329867f67320166e3a2a2c96649ea9c98a28bb0607ee libblockdev-loop-devel-2.24-11.el8.aarch64.rpm e1ae1aa43c2d91514d8c01d07c713e9467180a5389624494459b47f6f1e247a9 libblockdev-lvm-devel-2.24-11.el8.aarch64.rpm 6263292aa499a6270409a992a5ccf1c75912f5fce9b21465dcdccb5fff04a238 libblockdev-mdraid-devel-2.24-11.el8.aarch64.rpm fd66045929c3d697425c068c41c9e6da49d4501407f2060f5b08a6510aef17bb libblockdev-part-devel-2.24-11.el8.aarch64.rpm 9e73605337bdb599811ac2abd3f897a3fc1b80880dc87e3b279b55a4c5ff038a libblockdev-swap-devel-2.24-11.el8.aarch64.rpm d832627d8d846cf5dfc525ee80158cc6a69273fcedd4c6d27359ad24f23bb7e1 libblockdev-utils-devel-2.24-11.el8.aarch64.rpm 2af0351939fe20b9329f0ee6010c275416633487fc517a57a09332a2f62424eb libblockdev-vdo-devel-2.24-11.el8.aarch64.rpm 3b1444a751f48ee93012c329d8fcce0325ecfadc1b03323daf8adaaf990980eb RLBA-2022:7653 cups-filters bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups-filters. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms cups-filters-devel-1.20.0-28.el8.aarch64.rpm 99ae6233a0c2336fe1611de06ccea9f47b5dea7afc307715cc119860b0c6ec33 RLBA-2022:7657 openslp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openslp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms openslp-devel-2.0.0-20.el8.aarch64.rpm 4988b4c0c314cc2e5740e8f8b572e729f0ebc8a58fe2ef727f041348943a50a2 RLBA-2022:7659 gtk3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gtk3-devel-docs-3.22.30-11.el8.aarch64.rpm 60f28864adf3dbd71fa6d0a11a0ad7527b762b08a3ef5195a6f718b9b787b257 RLBA-2022:7658 freerdp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freerdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms freerdp-devel-2.2.0-8.el8.aarch64.rpm 00ac3254caea61fedf694e2c9a8cddf10bba3d68d4c880b4bd0cc8147ec71ccd RLBA-2022:7661 vulkan bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms spirv-tools-devel-2022.2-2.el8.aarch64.rpm 72a67441532207bc8bab6fd8c3db8933c7029d916a52c469a448106bee0917eb RLBA-2022:7662 opencv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms opencv-3.4.6-8.el8.aarch64.rpm 95efe1563ffdce8aee024abcb4fd75ac5beabda037656eec08cb6c44c5899186 opencv-devel-3.4.6-8.el8.aarch64.rpm 50d207869310fbe19253099bd51cbf05de17ca28471664fdaad1b797eb8b2138 RLBA-2022:7663 wireshark bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wireshark. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms wireshark-devel-2.6.2-15.el8.aarch64.rpm b327e17562ebea8d11e5232530af268ee81f70e4ce577b871b968ff1aa3cd137 RLBA-2022:7674 openwsman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openwsman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libwsman-devel-2.6.5-9.el8.aarch64.rpm b5d8993c673e125011436e3fd2fd66aa36f54e3c5643c13dbe721d4ca755713c RLBA-2022:7091 java-1.8.0-openjdk bug fix and enhancement update This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm b7d35d9f285a1b0dec58da3c3f4a0ffc7ebc591e4153249ebdccc04dd2a9d790 java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 18d16f2d145b0a74d9c5708123ebc80234856f31d9b12140ffad3f696018a54a java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 19365b81c215dbecc57340be70effc577928ce7e948433336c1ee582bac02acc java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 647d993682f191b54be44e034069c6b7c440095f92b6e9fb7570a0739577e108 java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 70d11b21564ba0f9687a7ecffc2d7dd9f86fe6b1a875e3ffa57d3fa9f7708815 java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 320d6c5f7d96eed48a774fb425120467c3de9d3b7dee221671acc71d649892ea java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 9d00ba06ee69c2f9777b452d779a8173ca4b3b5ee2e550359b6093ca0596de16 java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm a551632ab45c43f2264420ffc7910ec143bb2b9b6d9311ea2ce9556630dee26f java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm 0fff96db56187df2caf62c76b6dfc2991037ff451380ea4e519df9e1f4f6f2e6 java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm e59b364a29f07f98415d5cd0279e46427b44814318240ab114b8f0a7becaf884 java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm fcc84852a012c72513ec52f6a95f336c04b1eef97d9378d23839a1061cf52ce2 java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el8_7.aarch64.rpm bc1bd795a4363451df05af031f89c05069f40dcdcc3ce17b6bb42ffbf629846c RLBA-2022:7835 mutter bug fix and enhancement update Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.7 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-8.7.0.z] (BZ#2136746) rocky-linux-8-aarch64-powertools-rpms mutter-devel-3.32.2-67.el8_7.aarch64.rpm 3c003fecdd9f9bb0d839d505ee2f17c7167fe3859b91a3c7bc09ed294a795253 RLBA-2022:7258 java-17-openjdk bug fix and enhancement update This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-17-openjdk in Rocky Linux 8.7 GA. The original builds for Rocky Linux 8.7 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 8.6. For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms java-17-openjdk-demo-fastdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 1db7038e4b8776b58c8473e7e8f2f1b1f5fc53f51059eab6b31daea1947a501f java-17-openjdk-demo-slowdebug-17.0.5.0.8-1.el8_7.aarch64.rpm cec3c9a04ebe8db2186a5f559611282138209afccfc4e021b36ffa674b145ae1 java-17-openjdk-devel-fastdebug-17.0.5.0.8-1.el8_7.aarch64.rpm ed35d711c9f2d217fa186df26467f32a979e97da2229293234f77a5e44e23e1e java-17-openjdk-devel-slowdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 0f3e00f91e2d13b1b80747afad0370e13440edde56ac5461cf1e105a35092b9b java-17-openjdk-fastdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 423f987c2d734e2adafa322917a78e441c0f68ddc972353bba46538252b84464 java-17-openjdk-headless-fastdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 2c43cbce2932c0d49ea4bdad39b566c9d562980797b66147cb6760696da1fece java-17-openjdk-headless-slowdebug-17.0.5.0.8-1.el8_7.aarch64.rpm fa43fecb9ea9a1ae9f8a24be70ac5b2ade6e6ba59cb3ea65aa3b5499e5fc11d3 java-17-openjdk-jmods-fastdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 1d8c409947f4de1e5d35079f90a1c270bc2dc964b0b55244f20cf982342392a2 java-17-openjdk-jmods-slowdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 9e45b8ed819fdb3cad881c2fb55e81186e9ee571569b00bce52c9ffb1893668a java-17-openjdk-slowdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 32ab580d468a726d1d098e7c92693f4b283a7cec346dc12151f90fd557214818 java-17-openjdk-src-fastdebug-17.0.5.0.8-1.el8_7.aarch64.rpm b3faff2c204b1820e96aa8e094c953271f55e3b13f6336d8188b7806175646d2 java-17-openjdk-src-slowdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 80d9f410eb8d947c67fc5a271f791879d8a70aeca174c25570b31af93045909e java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 97471dda81e66315849e5a9221450159ee71f4745b8b261c9c74c5a5fd5534db java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-1.el8_7.aarch64.rpm 1b157a81cf7d09063a79b81668ae9cce76edaf96fb2033c69c5c942d108ee409 RLBA-2022:7438 java-11-openjdk bug fix and enhancement update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es) and Enhancement(s): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-8] (BZ#2131862) rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 3bfaf40d6ce1959875cb008f43624e57f206f6cd1a89c76c9930e86c538dd26d java-11-openjdk-demo-slowdebug-11.0.17.0.8-1.el8_7.aarch64.rpm e71e09ff9afeb55ea50b20eb34617087a6a289c6b4eb382e1497e3f57e6101d2 java-11-openjdk-devel-fastdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 2d4d87d7a55274e14e6c859c7eac753ec8334ddf3652869b2298f56ea0746b20 java-11-openjdk-devel-slowdebug-11.0.17.0.8-1.el8_7.aarch64.rpm c87abd7dfc24b22c3caf80a96534964442549b62a0d6c4e9cb6ba937746562e8 java-11-openjdk-fastdebug-11.0.17.0.8-1.el8_7.aarch64.rpm bcf162dc622e3e291c90b25a55b790c63e9bfbc3794147f01388df4f36245319 java-11-openjdk-headless-fastdebug-11.0.17.0.8-1.el8_7.aarch64.rpm e6448cf97698420d5bb4b899d16660984eee1eed4f5814f8ca877700d5513f11 java-11-openjdk-headless-slowdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 715903def691dcec7ebd0353f2816f4b953d2956d00e08bc11611adf0595d4f3 java-11-openjdk-jmods-fastdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 023baf80b46b8d26e103d52cc29607b30309c7166964fa74ecb54df7e6941335 java-11-openjdk-jmods-slowdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 2c0ddbd460a485cf844412f73354b60edae85e3508a5ce2b4461a46271f1c1e3 java-11-openjdk-slowdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 92e5b26d8be188201782fdd085116005517a83d0405d55cb62cd5df434be380e java-11-openjdk-src-fastdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 6e799747d770be54bed3f0f4200cc7718372a58fc710548afa4e08c2d3300a63 java-11-openjdk-src-slowdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 6f5e87875377f5538082bc755ed223b7146ca53f8e31ade3cecce242b126d845 java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-1.el8_7.aarch64.rpm 744db94b1d921ef0ad34f790fd7442a05d30bf18690f0d700f25992e2a7ba34b java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-1.el8_7.aarch64.rpm c61da47cf51158889e07011475d6f0c5272ef5d75af0cf549bbed91c66f70bed RLBA-2022:7861 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.100 and Runtime 7.0.0 [Rocky Linux-8.7.0.z] (BZ#2137943) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.100-1.el8_7.aarch64.rpm 62b0f7566db6102a5f317409cefb4e7c6c04037c04efbd4d24111c8e6c104fc8 RLBA-2022:9019 .NET 6.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.112 and Runtime 6.0.12 [Rocky Linux-8.7.0.z] (BZ#2150147) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.112-1.el8_7.aarch64.rpm 082c3d9e67e99d567ce6f9e37e9fcca07ee2c0e2776950207b754f96d5b83148 RLBA-2022:9020 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.101 and Runtime 7.0.1 [Rocky Linux-8.7.0.z] (BZ#2150151) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.101-1.el8_7.aarch64.rpm 95a0b68ad8cbc159f939575b8c77cd50f6edbc1bb608199a571c0e6aef6a13ba RLSA-2023:0079 Moderate: .NET 6.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154458) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el8_7.aarch64.rpm 34ca919af35ec55475602d07a47d001e1987a30bba1f4db9eb7405e72fc7c33c RLBA-2023:0081 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-8.7.0.z] (BZ#2154466) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.102-1.el8_7.aarch64.rpm 0d7f83838df27c16ca0f62fc32c2a791ebc773ef2e5e7e7ab55805b8ddba59b9 RLSA-2023:0095 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867) * libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) * libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libtiff-tools-4.0.9-26.el8_7.aarch64.rpm 7a5f511c8aa743a1575e9948272a6c70688f9b5498b8f7925e3e30653013faf3 RLBA-2023:0102 nmstate bug fix and enhancement update Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * nmstate verificationError on OpenshiftSDN (BZ#2128555) * kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operator (BZ#2139698) * Addresses configured at different order than specified at state (BZ#2149048) * fail to create many veth interfaces (BZ#2150705) rocky-linux-8-aarch64-powertools-rpms nmstate-devel-1.3.3-4.el8_7.aarch64.rpm 9e40cae0bb9f7d5c03667e91e9ffced778125e449ac06b279ed913855fb17756 RLSA-2023:0192 Moderate: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-8] (BZ#2153010) rocky-linux-8-aarch64-powertools-rpms java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el8_7.aarch64.rpm c7c63b500143352eb941dacfdd1fee33bc542cd5329bc61efb535e6e1e6e68d7 java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 000524decd5696a63699ad97eb589afc9c042ee61a511fde70884edc83f4fd74 java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el8_7.aarch64.rpm fed3879cb41ff565775633146aa88f652f44b764e0f8b6ad52375098893fc538 java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 840272e38a328803d4ecc23fb873570d8bc49798e0e8aaebb74d149726ada9e8 java-17-openjdk-fastdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 3f7aede4b3980c91b70e809a767cfcd58ceb917dd5ad202dd0b17f88f72b052d java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 2b5187f33c68429870c18cb0c6e47e27b0cf309decf15ef16ed6580b509ba327 java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 01cb48158a5bbb8aa428f325677f21f2514443086c374a9291f73f2b98f7af59 java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 962256fd306e03853f2612752261b794d261a7665964439ae7dc8e0277dc38f4 java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 345f48a7070883571146f9661874f51037b5be2918241e3155659153e07bbf6a java-17-openjdk-slowdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 7ddae8dd66f6fd349b3cadc391d9f51a48030f340458741a75ae0c1371560719 java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 5e58dc693e487294d3f6784b2678cc4ea62b947d20f33a32f64aaa7f657219b4 java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 060e7990bd30cfa353fcb871937fb1885521b1f525763bb07d85d1f33a3cacee java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el8_7.aarch64.rpm 5889972f86fe241481c01e594e8ae47305cb0de9242c52797a28cf1ac487c423 java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el8_7.aarch64.rpm ebc81f7ac437f2d537f807acca4eae4e03e720bf08895c526f57409634f51dfb RLSA-2023:0200 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-8] (BZ#2157797) rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 2f44c2f88619c67d1164fe100f7479955578564fb35d60e2016140f5b782c061 java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 597cb5a6dc375af471fcd13f008ef53bf17759a7eab6dc68f94ec88c77dda4e6 java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 356aebde455468b10c943efd821522502fe6b1a0d8e3d863f8b42d0ceff8231f java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el8_7.aarch64.rpm c73bb86e6d3d97103a6d69897cafe6a7082c7bd98b4d9718a5894c282882d92d java-11-openjdk-fastdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 1f27baaff8bb0218f465ccc6863d33e74b565ff7deadffd9e2620fc7a6aa33f9 java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 153c9ee1bbbbdb25d8e32ee89ad8abbe31effa6ef51e206999f75f50f7fb4201 java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el8_7.aarch64.rpm c44568cd91724942755b96fbb79070721b1e9c6de5f5d49fdbc59fcd6c6b5f57 java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el8_7.aarch64.rpm d355711dd5326e0864e8e16d452e1eef11f5c65cebc7821ba20a281aa67af01b java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el8_7.aarch64.rpm dc8e42f5d4dc0d4641f5aab7b41b5765db0bbb14b1c9f7c909036179482e3c4b java-11-openjdk-slowdebug-11.0.18.0.10-2.el8_7.aarch64.rpm ae74329fd5a73e000d460332935bbc57ca7ebdad72712c21445d74bd07a74823 java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el8_7.aarch64.rpm eaa3723c053b67df72df94e52d5f19b72953bebd559b2143868dabd9d9e66766 java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 2119bf5c4c28fead21b9a1bf6bf3401aa5f9a88c0015162661a236a7f802d5bd java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 050a263d6e1fb4d52fa016e5e4f44ab0558c228aa7af4bc7162340e2eaa89021 java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el8_7.aarch64.rpm 6997953eeff92c5cae9f857867350715be30bd684e2d2418246cf48b2763b3d8 RLBA-2022:7815 kronosnet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kronosnet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libknet1-1.24-2.el8.aarch64.rpm 83109d06e8afb5ffa7919c788d4b9e753e09585180b8d023d5ca089a35c92d31 libknet1-devel-1.24-2.el8.aarch64.rpm 3b188051d0a9c7014233fc959aefb2192e68e5a09b949c89e12369f71879b842 RLEA-2020:4838 dtc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dtc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms dtc-1.6.0-1.el8.aarch64.rpm bd44c1b92210f89ce787ee1ee9530d1c104bb0abb3c11db6ea1c84d384918e59 libfdt-devel-1.6.0-1.el8.aarch64.rpm bb45c74cd9a86723f6d3945371c8aa3e711fe84581fd10c7fe30116abe574578 RLBA-2020:4499 NetworkManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for network-manager-applet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms jimtcl-devel-0.77-6.el8.1.aarch64.rpm 41df21377ee0f98f6cd1201f5416e90dfc400c9978b33c43b3f3e3beaee4d79a RLBA-2022:2000 glib2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms glib2-doc-2.56.4-158.el8_6.1.noarch.rpm aa64cb9e557a147c0ba86aef7701e556397a660ebaa7822bdc19c57b448ee3f0 glib2-static-2.56.4-158.el8_6.1.aarch64.rpm 0f8a19b268e0fe16bd451aa6559ef625a0065c97b255f4ba78f423921b3f5948 RLBA-2022:7739 sssd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libsss_nss_idmap-devel-2.7.3-4.el8_7.1.aarch64.rpm 876fb14ca6ee70e7b6765a8c5ba645a22ff88456304b416f660290d56c48f376 RLBA-2022:7766 fwupd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms fwupd-devel-1.7.8-1.el8.rocky.0.3.aarch64.rpm d0cf8802b3aa1cf546d49ee80e22f3aa5810aed4c31a99ebed05b7ae305e8710 RLSA-2023:0208 Moderate: java-1.8.0-openjdk security and bug fix update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI() (BZ#2139705) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8] (BZ#2159910) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8] (BZ#2163595) rocky-linux-8-aarch64-powertools-rpms java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm 84ca154b41c0a60fc145dda85cd4bfc370c3341b4a20789fab480eadda0b3a86 java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm e929c0200229d2455a80e69e8a2fe40659aa0f51e7483e7f2d6b8e8d11455cc7 java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm fca8be62a3d98c5674d91b003673b1683301dcd1b852b67ad01f0c1663af20ea java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm b5dae2e1539a65d47e9a0de07026941357df28684452045ee5637d4ef78e4c8c java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm 436c3fe864d618ae96d28eac21897c8ea266946cddfc62f6af6b7c6881711c41 java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm c10d620b06db9fd583e8e6166cb235943f601a0d1fc75036b3723901a4ecae8f java-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm 725e9e267b322e8770921b47697ce64ada67cc53afc11b8c76e831f857f98440 java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm f6d27a485b2fbe33b914192173b684fc3538e91340b3245ee8270de8ab8f2d4f java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm 6f6bbf587b09c9dd27fef5fc0bbce541c3d6a49c4109f3bae9702fcc20baf1ae java-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm ca05de79562c8ac83fdcc3c833a344906ed4a81325522ee7216e557ec471a507 java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm e464756dd4e4ace64fe22f419bc2d1528c4beb30c55ae7ed8942b2ed415fea51 java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el8_7.aarch64.rpm 84e2f1c1e1e748fa02fc9648c1fa3b89000662b79163858ad5e024dfda2004ab RLSA-2023:0625 Important: libksba security update KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libksba-devel-1.3.5-9.el8_7.aarch64.rpm ff3e268c4fe5fa67c372c7332e948c594909c5626d8175ffdac0c7359ae48369 RLBA-2023:0783 .NET 7.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z] Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166775 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-8.7.0.z] rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.103-1.el8_7.aarch64.rpm 498719b17fc506174bc1fc755cb166045adcb391e8041d773df242cf8e7f448f RLBA-2023:0784 .NET 6.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Security Fix(es): * 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z] Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugfixes are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Security Fix(es): * 2166769 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-8.7.0.z] rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.114-1.el8_7.aarch64.rpm 82f29580b41e2759ac0a0db2fd28e68a9d5271f0bdb649d77c1a6402fdb8641c RLEA-2020:4672 autogen bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autogen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms autogen-5.18.12-8.el8.1.aarch64.rpm 0650d5b015f1463a2114cfd40dfda59558f6c8ef4393647fb85324ca308fb6ff autogen-libopts-devel-5.18.12-8.el8.1.aarch64.rpm fa8189b9ac3938cd80103cbd1be9a1d984e411b465f169c47082d2a58fa8910a RLBA-2020:4734 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libblockdev-crypto-devel-2.24-11.el8.aarch64.rpm cb14c1f82e01f1371de7591977a41c114135cff1745cc17dfd7ca9c2d480de8f libblockdev-devel-2.24-11.el8.aarch64.rpm 18b97b9d72772bba6ecaa8816bbce22a64925876ce8c0c9506d3b5d4722be889 libblockdev-fs-devel-2.24-11.el8.aarch64.rpm a43a737349195369e421329867f67320166e3a2a2c96649ea9c98a28bb0607ee libblockdev-loop-devel-2.24-11.el8.aarch64.rpm e1ae1aa43c2d91514d8c01d07c713e9467180a5389624494459b47f6f1e247a9 libblockdev-lvm-devel-2.24-11.el8.aarch64.rpm 6263292aa499a6270409a992a5ccf1c75912f5fce9b21465dcdccb5fff04a238 libblockdev-mdraid-devel-2.24-11.el8.aarch64.rpm fd66045929c3d697425c068c41c9e6da49d4501407f2060f5b08a6510aef17bb libblockdev-part-devel-2.24-11.el8.aarch64.rpm 9e73605337bdb599811ac2abd3f897a3fc1b80880dc87e3b279b55a4c5ff038a libblockdev-swap-devel-2.24-11.el8.aarch64.rpm d832627d8d846cf5dfc525ee80158cc6a69273fcedd4c6d27359ad24f23bb7e1 libblockdev-utils-devel-2.24-11.el8.aarch64.rpm 2af0351939fe20b9329f0ee6010c275416633487fc517a57a09332a2f62424eb libblockdev-vdo-devel-2.24-11.el8.aarch64.rpm 3b1444a751f48ee93012c329d8fcce0325ecfadc1b03323daf8adaaf990980eb RLBA-2022:7462 anaconda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms anaconda-widgets-devel-33.16.7.12-1.el8.rocky.0.1.aarch64.rpm 02fec851b51fd4c6e181ac2633ce588df41619ecbbbece9747a727b96fc405b8 RLBA-2022:7635 openscap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openscap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms openscap-engine-sce-devel-1.3.6-4.el8.rocky.0.2.aarch64.rpm f57145920f2b265a0c7f77920599faf6834fddf5c470dbe38bf177a63f4726aa RLSA-2021:1734 Moderate: shim security update The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) * grub2: Use-after-free in rmmod command (CVE-2020-25632) * grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) * grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) * grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) * grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) * grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for shim-unsigned-aarch64. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) * grub2: Use-after-free in rmmod command (CVE-2020-25632) * grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) * grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) * grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) * grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) * grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms shim-unsigned-aarch64-15-7.el8.1.1.aarch64.rpm 50d3fdb8369d8b026f80727bf61924a9d167b365f18718a1f42c4e6d41c70e27 RLBA-2023:0831 nfs-utils bug fix and enhancement update The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899) rocky-linux-8-aarch64-powertools-rpms libnfsidmap-devel-2.3.3-57.el8_7.1.aarch64.rpm 25a347435dde9ac7dc003426bf7f1bb035c61e807f50c078f7771c799cbe6272 RLSA-2023:0832 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586) * Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592) * Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580) * MEI support for Alder Lake-S (BZ#2141783) * Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959) * Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287) * Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474) * i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745) * Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530) * error 524 from seccomp(2) when trying to load filter (BZ#2152138) * Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734) * Connectivity issue with vDPA driver (BZ#2152912) * High Load average due to cfs cpu throttling (BZ#2153108) * The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230) * Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653) * kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460) * Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272) * Azure: VM Deployment Failures Patch Request (BZ#2155280) * Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289) * MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437) * GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797) * Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905) * Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813) * ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182) * (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221) * i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460) * iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586) * Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592) * Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580) * MEI support for Alder Lake-S (BZ#2141783) * Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959) * Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287) * Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474) * i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745) * Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530) * error 524 from seccomp(2) when trying to load filter (BZ#2152138) * Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734) * Connectivity issue with vDPA driver (BZ#2152912) * High Load average due to cfs cpu throttling (BZ#2153108) * The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230) * Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653) * kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460) * Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272) * Azure: VM Deployment Failures Patch Request (BZ#2155280) * Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289) * MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437) * GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797) * Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905) * Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813) * ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182) * (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221) * i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460) * iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-425.13.1.el8_7.aarch64.rpm 010869ff3cda80feb58182eadb7292e0fbc50e6b9b45d460e32766cb61500551 RLSA-2023:0838 Important: samba security update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libsmbclient-devel-4.16.4-4.el8_7.aarch64.rpm 8748deb897fb5a7271e2d92a834f07138130e23a5e2efd226cd26397222f027d libwbclient-devel-4.16.4-4.el8_7.aarch64.rpm 8afb151fcaf908cefb5c0e8432e9cd15294ad36ad337bd0ef4a53ea06cbd0489 samba-devel-4.16.4-4.el8_7.aarch64.rpm 8157f0dca8e0221e70b1020395c1fa0e7428b865310f0e3fb5cda84345bc7d53 RLBA-2023:0850 openscap bug fix and enhancement update The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * xmlfilecontent probe produces invalid OVAL results (BZ#2165577) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openscap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * xmlfilecontent probe produces invalid OVAL results (BZ#2165577) rocky-linux-8-aarch64-powertools-rpms openscap-engine-sce-devel-1.3.6-5.el8_7.rocky.0.2.aarch64.rpm 8833b00e6629abb91dbca0367542e588961aeade5060f4e39e27f91b9a93f757 RLBA-2023:1245 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-8.7.0.z] (BZ#2175026) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-8.7.0.z] (BZ#2175026) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.104-1.el8_7.aarch64.rpm 1d410a382fbd371928e3dfc7bc3961ef155035deb48d53a69f1d5c892d7ebc61 RLBA-2023:1565 device-mapper-multipath bug fix update The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es): *Multipath segfault after running newest patched version (BZ#2161393) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es): *Multipath segfault after running newest patched version (BZ#2161393) rocky-linux-8-aarch64-powertools-rpms device-mapper-multipath-devel-0.8.4-28.el8_7.3.aarch64.rpm e5a1407fa7df5f6df25e0d4d476be782b3b1abb611fa2f20b124f060567087ad RLSA-2023:1566 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770) * Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170) * AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275) * Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750) * Kernel panic observed during VxFS module unload (BZ#2162763) * Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587) * Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296) * kvm-unit-test reports unhandled exception on AMD (BZ#2166362) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368) * Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665) * panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602) * net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640) * Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645) * mlx5: lag and sriov fixes (BZ#2167647) * Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776) * GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896) * Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228) * fast_isolate_freepages scans out of target zone (BZ#2170576) * Backport Request for locking/rwsem commits (BZ#2170939) * ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550) * Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103) Enhancement(s): * Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770) * Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170) * AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275) * Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750) * Kernel panic observed during VxFS module unload (BZ#2162763) * Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587) * Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296) * kvm-unit-test reports unhandled exception on AMD (BZ#2166362) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368) * Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665) * panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602) * net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640) * Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645) * mlx5: lag and sriov fixes (BZ#2167647) * Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776) * GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896) * Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228) * fast_isolate_freepages scans out of target zone (BZ#2170576) * Backport Request for locking/rwsem commits (BZ#2170939) * ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550) * Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103) Enhancement(s): * Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-425.19.2.el8_7.aarch64.rpm 3e5af635ab3ca5eb4ee1929b2358c82531ba7750cb1737a14e22a592341bf981 RLBA-2023:1567 samba bug fix and enhancement update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394) * ctdb should have dependency for package samba-winbind-clients (BZ#2170467) * Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468) * samba-tool reports an uncaught exception (BZ#2170469) * Ship new samba subpackages (BZ#2173975) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394) * ctdb should have dependency for package samba-winbind-clients (BZ#2170467) * Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468) * samba-tool reports an uncaught exception (BZ#2170469) * Ship new samba subpackages (BZ#2173975) rocky-linux-8-aarch64-powertools-rpms libsmbclient-devel-4.16.4-6.el8_7.aarch64.rpm 7e2e3ec5bdc2e7bf66cf4b20e65d97dfe402f04f1867306f0e5d89dc9678e550 libwbclient-devel-4.16.4-6.el8_7.aarch64.rpm e000ae3f5aebba46da219b8f425080ba5df6afdc6b85d50bb0056689a8587b60 samba-devel-4.16.4-6.el8_7.aarch64.rpm 4c2a41bf8f3ddc71c79c6f6af6207026ba91b83b4b64deff55eaded4c8dcb971 RLBA-2023:1570 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager hostname lookup fails with IPv6 (BZ#2174362) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager hostname lookup fails with IPv6 (BZ#2174362) rocky-linux-8-aarch64-powertools-rpms NetworkManager-libnm-devel-1.40.0-6.el8_7.aarch64.rpm 3da9406c37f4594eb8a8f88f5a7ed6e06c026d1d7bdd34eccec02fe806738b08 RLEA-2023:1574 nmstate bug fix and enhancement update Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * SR-IOV VF not disabled as desired, gets IPv4 and default route via DHCP (BZ#2169642) * Dual stack profiles do not set may-fail correctly (BZ#2170078) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * SR-IOV VF not disabled as desired, gets IPv4 and default route via DHCP (BZ#2169642) * Dual stack profiles do not set may-fail correctly (BZ#2170078) rocky-linux-8-aarch64-powertools-rpms nmstate-devel-1.3.3-8.el8_7.aarch64.rpm 4ba2f7d3b0c516d2167c08615ae1b2ca85303c07a2efdcc4fa31f40952b6c3ff RLBA-2023:1579 upower bug fix and enhancement update UPower is a DBus daemon and a client library that provides an interface for other programs to enumerate power sources on the system and control system-wide power management. Bug Fix(es) and Enhancement(s): * Rocky Linux 8.7 Missing battery icon while the battery is charging. (BZ#2170088) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for upower. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list UPower is a DBus daemon and a client library that provides an interface for other programs to enumerate power sources on the system and control system-wide power management. Bug Fix(es) and Enhancement(s): * Rocky Linux 8.7 Missing battery icon while the battery is charging. (BZ#2170088) rocky-linux-8-aarch64-powertools-rpms upower-devel-0.99.7-4.el8_7.aarch64.rpm c7e8a1cd4477d1266651f21d2559619de838667467a9500dfb485d4b9fa70dea upower-devel-docs-0.99.7-4.el8_7.noarch.rpm 1c90886eb71223a62206ed760389e25ed8a20f292f2a15f8c466044da1b3a26b RLSA-2023:1898 Important: java-17-openjdk security and bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186835) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186827) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186831) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186835) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186827) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186831) rocky-linux-8-aarch64-powertools-rpms java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el8_7.aarch64.rpm c4fb9688490a1e8d357e1d0e276806eac25dd879cc3af86e71deb7d785c0d904 java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el8_7.aarch64.rpm 4a6b1a0772ad883b8c9ccd16820b2815e935654aca4dfd71baeb609f06593440 java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el8_7.aarch64.rpm c806241a90ecc005cddc6172942a1640c48baf46c688a5cd649176a7ba718cc5 java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el8_7.aarch64.rpm d55b56c767d6181af409277178dcaaf9df3e4eea9ac708d658a097e03fe18e36 java-17-openjdk-fastdebug-17.0.7.0.7-1.el8_7.aarch64.rpm 41058d39fbe0abe1bdc9472600816cdac0613cb61b5040a54d992635ef370ae5 java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el8_7.aarch64.rpm a21a7567fd1db6345eb021c26d206de461270c8254722975ab709bfc0b7caf21 java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el8_7.aarch64.rpm c5da803bbb523b0e21b3fe49d662e8646939f1104c030b2dd71a44eaa597ae9d java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el8_7.aarch64.rpm dc8780cd5d86e272bcef8f31aa3ccc362fb88dd50e843c080bb9a4197d9b8a49 java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el8_7.aarch64.rpm 94119ffe5e98c4c910647d639d5e292e79fdf7881f646668e9477be1d767317e java-17-openjdk-slowdebug-17.0.7.0.7-1.el8_7.aarch64.rpm 41c544211dd921db28d5e655a6cd8674ebf929b518581cfc752538b8ed6395a5 java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el8_7.aarch64.rpm d44c2177c00ce73825653f1831b53b9ef73fd038e9917511dff9eb8a8d0ca1c6 java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el8_7.aarch64.rpm 307ccf0aab5ef162d4abb8669d3b6039ceb5b3d83e87ffb94d2157b699f04c9d java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el8_7.aarch64.rpm 0403d8b1ecbee4ccff84b4b7e000ad3f91199b3f31543ca4a719212a6cc428a1 java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el8_7.aarch64.rpm 4326c4eef49b9ed591ba09cb0cddcf9ab534fe16342291840d49c67f47042a3e RLSA-2023:1895 Important: java-11-openjdk security update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 25fa6c088b1c6003ae4e3b8af74099f153367546395d9e8858c0901bead64dae java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el8_7.aarch64.rpm e420b8ddf742512472763e5058372c68dcc46168519cf36ee17f993ced9a2592 java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 4f824e3c51388f377cc764857b93d38dda7c6485eb1213298be5bef83c3cabf0 java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 8b194ac76d92bfae88587633de2758f25273f1c35a5f2dd08a1e83c2238a640f java-11-openjdk-fastdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 85e6e8c2705e424337efc4432025cbfe81335d50f79031dbfbb54c5397a2f1c9 java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 45a114b1e59929af1ae435836d4cd58e3a7e33ca021b50a6e1e7b6d6a3011882 java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 7d741365dbb464e18dd9f1840d16d327a86613ab72f18490e6b64bb6020aaedc java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 31044d85192d358800bde37f3296c4e69c7d6cec7316b5f0da7595118fd4f7d9 java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 79204939ad3b55c4f57260fbbaa91a79c8d21aa720ff47971993ea71abae0eab java-11-openjdk-slowdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 31b6e063df8d867c804422110dbf84ee3986dd926b22792b36b01d9c8f408afe java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 6034d0a94c29c2bff515da904556eb38e9a16226e5c32856c9f16a0bfff80633 java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el8_7.aarch64.rpm b1f0fb85860bb1d9d6dec88846b8985041ff57f3c5b38c235fe27c6e56d468c9 java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 25f2c1b0181106b4286cc275c7a49eb3733de70378b254f1c3da94d0deb7f157 java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el8_7.aarch64.rpm 77a1d249c98ceb9cc1ac3acb1dd787535adf32d1a759fb63b25f29b7ff839d5b RLBA-2023:2991 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-talloc-devel-2.3.4-1.el8.aarch64.rpm 67914a7b492edbf5dd3f9141bf5f0251c351ebe005b4472b6d1ce22da2fac6f2 RLBA-2023:3007 libtraceevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtraceevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libtraceevent-devel-1.5.3-1.el8.aarch64.rpm 93ec8ddb9567420af1fc62e8790486a88a77d4b09b3b7ec2126e8b4e689f6f8a RLBA-2023:3048 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms device-mapper-devel-1.02.181-9.el8.aarch64.rpm d0ea2d8a90c77b54af39f2f2908aa263134c924c90f503d55aebacc6b07aa0ca device-mapper-event-devel-1.02.181-9.el8.aarch64.rpm 4f3d30cbfe9c01b316d7cab49a5662ae922e25a88ca7fca5f86291eb090bd06d lvm2-devel-2.03.14-9.el8.aarch64.rpm 9433f339f0f1d10e703f5bb263ef81843a63ec2f42bf61973aaca3e8e1abf361 RLSA-2021:1849 Moderate: freerdp security, bug fix, and enhancement update FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The following packages have been upgraded to a later upstream version: freerdp (2.2.0). (BZ#1881971) Security Fix(es): * freerdp: out of bounds read in TrioParse (CVE-2020-4030) * freerdp: out of bound reads resulting in accessing memory location outside of static array PRIMARY_DRAWING_ORDER_FIELD_BYTES (CVE-2020-11095) * freerdp: out of bounds read in PRIMARY_DRAWING_ORDER_FIELD_BYTES (CVE-2020-11097) * freerdp: out of bounds read in license_read_new_or_upgrade_license_packet (CVE-2020-11099) * freerdp: integer overflow due to missing input sanitation in rdpegfx channel (CVE-2020-15103) * freerdp: out-of-bounds read in RLEDECOMPRESS (CVE-2020-4033) * freerdp: out-of-bound read in update_read_cache_bitmap_v3_order (CVE-2020-11096) * freerdp: out-of-bound read in glyph_cache_put (CVE-2020-11098) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for freerdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. The following packages have been upgraded to a later upstream version: freerdp (2.2.0). (BZ#1881971) Security Fix(es): * freerdp: out of bounds read in TrioParse (CVE-2020-4030) * freerdp: out of bound reads resulting in accessing memory location outside of static array PRIMARY_DRAWING_ORDER_FIELD_BYTES (CVE-2020-11095) * freerdp: out of bounds read in PRIMARY_DRAWING_ORDER_FIELD_BYTES (CVE-2020-11097) * freerdp: out of bounds read in license_read_new_or_upgrade_license_packet (CVE-2020-11099) * freerdp: integer overflow due to missing input sanitation in rdpegfx channel (CVE-2020-15103) * freerdp: out-of-bounds read in RLEDECOMPRESS (CVE-2020-4033) * freerdp: out-of-bound read in update_read_cache_bitmap_v3_order (CVE-2020-11096) * freerdp: out-of-bound read in glyph_cache_put (CVE-2020-11098) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms freerdp-devel-2.2.0-10.el8.aarch64.rpm f392eb8e91d56a8f73e196b00b51d593ab48cd6e5fa0893063c1ae75d0bd9f26 RLBA-2023:2783 wpebackend-fdo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wpebackend-fdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms wpebackend-fdo-devel-1.10.0-3.el8.aarch64.rpm 9512eb0bf4175da28cc84c288b8d7e7cfd51226f41d8b3e0e18cb0e231703398 RLSA-2023:2810 Moderate: poppler security update Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: integer overflow in JBIG2 decoder using malformed files (CVE-2022-38784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for poppler. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: integer overflow in JBIG2 decoder using malformed files (CVE-2022-38784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms poppler-cpp-20.11.0-6.el8.aarch64.rpm 35d9912b060d0de81aaf5826f024ed061cabff5e21a66dbaef28edd35909d9a9 poppler-cpp-devel-20.11.0-6.el8.aarch64.rpm fc87b4181ccbc70ae66d7b069552d5285762c02ffc00004cd80d6b90b2ae2ff9 poppler-devel-20.11.0-6.el8.aarch64.rpm ad840b0f32274c06a8baab3dc136213c8c2d44a4336bc6d5125dd0bbc686dc07 poppler-glib-devel-20.11.0-6.el8.aarch64.rpm cd7bde41b823120557ded2b60a535605a77d274904895eb2318da6740d2119b3 poppler-qt5-devel-20.11.0-6.el8.aarch64.rpm 4684b1c920d80ab9ad7836c5ee10ebe18f6c4ea7c675e0e98fb82f8b08d62c3b RLBA-2023:3102 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Backport hint about systemd daemon-reload. (BZ#2180442) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Backport hint about systemd daemon-reload. (BZ#2180442) rocky-linux-8-aarch64-powertools-rpms libmount-devel-2.32.1-42.el8_8.aarch64.rpm 595c4ed836b4237afcf8ae02c084de6a87e16797c08e79d9ffb4c92975808ccf RLBA-2023:2765 gnome-software bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-software. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gnome-software-devel-3.36.1-11.el8.aarch64.rpm 4f17c61a3445c4953a6073cbb11600075360466a0607352f8e5aad60ddab4640 RLBA-2023:2812 qt5-qttools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for qt5-qttools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qttools-static-5.15.3-4.el8.aarch64.rpm c13adc8e12426f5b1638fcddbc3f14382acadea5e94b9d7f325ccfb4b870278f RLBA-2023:2922 python3.11-psycopg2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3.11-psycopg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3.11-psycopg2-debug-2.9.3-1.el8.aarch64.rpm a000c16fb01af3b3f34b8584611bd7585062a92cdd0b4184d185d928e6666494 python3.11-psycopg2-tests-2.9.3-1.el8.aarch64.rpm 1300ac924295321d3f9e9c3994423c9b1f835977cd5f7209980ba555a8f54b01 RLBA-2023:3092 nmstate bug fix and enhancement update Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * Rebase nmstate to latest 1.x branch. (BZ#2181166) * Failures when DNS is set to auto with DHCP and there is a static DNS search string defined. (BZ#2186178) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * Rebase nmstate to latest 1.x branch. (BZ#2181166) * Failures when DNS is set to auto with DHCP and there is a static DNS search string defined. (BZ#2186178) rocky-linux-8-aarch64-powertools-rpms nmstate-devel-1.4.4-1.el8_8.aarch64.rpm 379b764005703a9bbaca1d7083d4fc1539eb4d276752ce734c671cf24c22306f RLBA-2023:3093 .NET 6.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.116-2.el8_8.aarch64.rpm f7ad4769e6097cd7716c8f851a48248bb40cf6f0dcf8ae3746926dca12161caa RLBA-2023:3094 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-8.8.0.z] (BZ#2183589) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-8.8.0.z] (BZ#2183589) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.105-2.el8_8.aarch64.rpm 599e71d22144d86142246ce52af4b032693aa0f84f9bb3197cbdd43d1b28b6ba RLBA-2023:3099 java-17-openjdk bug fix update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189330) * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186834) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186826) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186830) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189330) * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186834) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186826) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186830) rocky-linux-8-aarch64-powertools-rpms java-17-openjdk-demo-fastdebug-17.0.7.0.7-3.el8.aarch64.rpm f56a7fe460427dc12573174aae21d0c570e1b2c052c90d7e6fa945804b076a72 java-17-openjdk-demo-slowdebug-17.0.7.0.7-3.el8.aarch64.rpm 61e408777f72cd9e96cb5b47ae38cb6df49318a3c4c4b302bafd74be2cc55e3d java-17-openjdk-devel-fastdebug-17.0.7.0.7-3.el8.aarch64.rpm fa234a5c67deb1985a7a8e96fdcdd37d630f6691160dc2c7895a2e69a37324a2 java-17-openjdk-devel-slowdebug-17.0.7.0.7-3.el8.aarch64.rpm 49be380a52576f7b3f3a749d53f31688d9e1ba72c97b78f845b386913e7a9700 java-17-openjdk-fastdebug-17.0.7.0.7-3.el8.aarch64.rpm 10b878d6fb4e40f95c6f61952c830b66d36f04ed637049efc10e3ad9d08c9c26 java-17-openjdk-headless-fastdebug-17.0.7.0.7-3.el8.aarch64.rpm 88e762a6c982163c1eca1cffdf8c50267e2137e26171c9d5425306d2ea87527b java-17-openjdk-headless-slowdebug-17.0.7.0.7-3.el8.aarch64.rpm 2f5bcc0c19e1c635b4fa8442b670f42d7b356556ca15557cfc028c1866d51ae2 java-17-openjdk-jmods-fastdebug-17.0.7.0.7-3.el8.aarch64.rpm 93924523c4e8c7186b3f7b3d6a42b610a70dad4d1f49e9578235129574e9f098 java-17-openjdk-jmods-slowdebug-17.0.7.0.7-3.el8.aarch64.rpm 6b351b49498f030480dd6f1735349cc25b065e27f7ebbdf2143a52b577c286cb java-17-openjdk-slowdebug-17.0.7.0.7-3.el8.aarch64.rpm 01366dbba18afc93fbd307ef2b180bade10dc33f25448cc480f2aa47f61099d6 java-17-openjdk-src-fastdebug-17.0.7.0.7-3.el8.aarch64.rpm 2e3a9ee5d73a90474468e6c3c55638c206f179b8b21e345c0244cc2b3d8ad907 java-17-openjdk-src-slowdebug-17.0.7.0.7-3.el8.aarch64.rpm 188645bea12bad2c82af6ca36b4d397ffcd884e22af4f853a799287554a9d5bc java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-3.el8.aarch64.rpm eb2b0aae148e8d5f9cf5bb84a348a7121a3e8904b2f44ee20d6e40e5ecc4b6e1 java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-3.el8.aarch64.rpm 598b4228b969eed66e8a362c8fb17a907ae02ccfdd7c4277242c1a9eaa783eb7 RLBA-2023:3100 java-11-openjdk bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189327) * Attempting to obtain a HMac key generation using the Sun PKCS11 provider, as in FIPS mode, caused an error to be thrown. This is because the PKCS#11 provider did not offer the corresponding key generation algorithms. The Sun PKCS11 provider has been updated to support these algorithms. (RHBZ#2190091) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189327) * Attempting to obtain a HMac key generation using the Sun PKCS11 provider, as in FIPS mode, caused an error to be thrown. This is because the PKCS#11 provider did not offer the corresponding key generation algorithms. The Sun PKCS11 provider has been updated to support these algorithms. (RHBZ#2190091) rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.19.0.7-4.el8.aarch64.rpm fabb37d5a5a3d4a3174a4b2f93be0adfff1063b393420252e896c0243dc0b157 java-11-openjdk-demo-slowdebug-11.0.19.0.7-4.el8.aarch64.rpm c193708d624805002368a92081b2e86b1418f84a51b4cae0ae2baf1c1fea25f9 java-11-openjdk-devel-fastdebug-11.0.19.0.7-4.el8.aarch64.rpm 7fa4c6d47e9b0bf196f3e304aeb8a6ffb40506754d500be8e62ebe5727457e59 java-11-openjdk-devel-slowdebug-11.0.19.0.7-4.el8.aarch64.rpm c985a5c87a04654273145f742013dfbd0a3e3b37a198826f9e20e4514fd9a604 java-11-openjdk-fastdebug-11.0.19.0.7-4.el8.aarch64.rpm 0292d7fe36cb6285c6c50ddb71a851afa3dbda72f993422dd0ac44f5c21fc060 java-11-openjdk-headless-fastdebug-11.0.19.0.7-4.el8.aarch64.rpm 2b36c0280d8469539528844e26f06f6082f25201e6051a945eb4f2af9754bcc1 java-11-openjdk-headless-slowdebug-11.0.19.0.7-4.el8.aarch64.rpm 5ed1da3d696df1d035a4b4597829c3350be7fc6d8ced52dafabcf7402c4cfb10 java-11-openjdk-jmods-fastdebug-11.0.19.0.7-4.el8.aarch64.rpm 48a1c919fa28c5c1a454f7501a9df2de968c97b886f9f8368a12014d871f0a41 java-11-openjdk-jmods-slowdebug-11.0.19.0.7-4.el8.aarch64.rpm 3489889816800b08d3a90f4fc3e76faddab6e024ab6f570c6df544a90d842d68 java-11-openjdk-slowdebug-11.0.19.0.7-4.el8.aarch64.rpm 6d6790040120a87407cb280d675610abd553b0b92fcc302953214abee7c32265 java-11-openjdk-src-fastdebug-11.0.19.0.7-4.el8.aarch64.rpm 133d56f72bbe7e4caf6361a7a63b5ffca25dee1c0c57f5eed9c4e5e2c21c4aa5 java-11-openjdk-src-slowdebug-11.0.19.0.7-4.el8.aarch64.rpm f44c72a4c82269ee59ea6590634a75927221ee46d52ce8301891200b7791013d java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-4.el8.aarch64.rpm 28aa1daf596dd460662f39975f488eeb167c04a0600ffb6be0b40e45e41e0bba java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-4.el8.aarch64.rpm 0f83ab95454f4423dfad7ec328e7e0ca531f3c38cf7e8fdbda41caa96d57144f RLBA-2023:3101 java-1.8.0-openjdk bug fix update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189328) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189328) rocky-linux-8-aarch64-powertools-rpms java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.372.b07-4.el8.aarch64.rpm 5c29181edb11d2991d6fc500e356114e3a115ff40d4cd93f06fa5ed34d49bc37 java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.372.b07-4.el8.aarch64.rpm d1ae233695f53e3b362e2f0aa2e459b97d56a7c37688fbec55f80a5a403a9632 java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-4.el8.aarch64.rpm 5437e7c674163e3bb507fd490c330005e6d814a6a65acb6dfe3f273ad32a8bb3 java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-4.el8.aarch64.rpm 6f101a1b34a0ee8fae2e431e5d43970fb3f78bb4fb6058268d510cf088da6b30 java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-4.el8.aarch64.rpm b122d1777de9cacd0365a7430abd657a891954b0c5faa9dc79c55bdccef55a9a java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-4.el8.aarch64.rpm 422e27f5305c34760a3044c238092de383995ab031af33b9e7538e2a91ccadac java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-4.el8.aarch64.rpm c1da5dda55a7eed9cd9d9158fb1e8276f6949d6e945e921600140ac35141a13f java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-4.el8.aarch64.rpm a9b2366fc782801de00319b2e7c38522c3dd52908265f0ba2763f986f5cabec0 java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-4.el8.aarch64.rpm 2de261314ac0a79ecbeec7621ba23d9fbfb21596c66137d7e5e0d8eb16efcd61 java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-4.el8.aarch64.rpm 4bcda9cbfd2ca9c4e8cd6f8fe263176a0b5a24aefdb4794001bb534484d6010b java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-4.el8.aarch64.rpm 952ced30c699bb7af5856f824883bf373dbda304b132d4c1d134015ec0c9328f java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-4.el8.aarch64.rpm 124a129226d74746628d219c9e9aa7d9eb4a5908f134e27169e4574bb4fc7820 RLBA-2023:2978 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms opencryptoki-devel-3.19.0-2.el8.aarch64.rpm 56b85bb8770eb1539f90478bcea597c64846a21f722650248d7d084af0fdd002 RLBA-2023:2979 libdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libdnf-devel-0.63.0-14.el8_8.aarch64.rpm d3e1e986ab6498d603cda25baf87a8f857163e74743608cb5ef88bff4f83a1c6 RLBA-2023:3010 libtracefs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libtracefs-devel-1.3.1-2.el8.aarch64.rpm 8e4af60d91fd420dc9c54af64d6c877d11f708b377aaa6c0513824c70087f9d1 RLBA-2023:3036 librhsm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms librhsm-devel-0.0.3-5.el8.aarch64.rpm f83fe5a4ef9c9e9e0a8028ee126e4dadebdd6026553d29d37e4d3cc5936ce998 RLBA-2023:3063 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms file-devel-5.33-24.el8.aarch64.rpm 7cdb0c2b08b351800c419674091d78e612e3c8d146d6e119bc455a0708521cb0 RLBA-2021:1801 libgpod bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libgpod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libgpod-0.8.3-24.el8.aarch64.rpm 9a2ac829d7f81e2f06b6aec6b726cb1311fb42c7457f7f0b07bd3ec64917e25e libgpod-devel-0.8.3-24.el8.aarch64.rpm 65ae4b96f8f497d581578577fd25ee939f4524a0599077b430a36def7c10b167 libgpod-doc-0.8.3-24.el8.aarch64.rpm 5cb11d20b4e3282b1d8ccaad17645b39564e2c5b323748274d37d0e6343e53a8 RLBA-2021:1837 liblangtag bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liblangtag. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms liblangtag-devel-0.6.2-8.el8.aarch64.rpm 95a7a89b590ed6f6ad7bda2edfdb08cddce529dcd5dd27d90ee1641eab7a8f36 liblangtag-doc-0.6.2-8.el8.noarch.rpm f43ea18bb2eaf66a6fc1097c3d708353a0a9acfbf9031191db36ba233d6eee37 liblangtag-gobject-0.6.2-8.el8.aarch64.rpm 088dd9bb18cb323bf24edebd5ec40e7a281025af55ef8c7d8b5e2d3202323006 RLSA-2021:1842 Moderate: raptor2 security and bug fix update Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. Security Fix(es): * raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926) * raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for raptor2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. Security Fix(es): * raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer (CVE-2017-18926) * raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common (CVE-2020-25713) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms raptor2-devel-2.0.15-16.el8.aarch64.rpm 66bbc94e0c4acf980d9bbfe2c6544f56237cefe0fd247d9f681c4ca26e4b77ee RLBA-2021:4348 brasero bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for brasero. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms brasero-devel-3.12.2-5.el8.aarch64.rpm d683e41c40d8355245ac9e1f637e28b57e5c8f5e500ea7f4f2c9217c9a8c873f brasero-libs-3.12.2-5.el8.aarch64.rpm 8c1d9c22d85d7b888633240a1a63958df1001d112a244c308ae09859b4e742ab RLBA-2020:3148 Rocky Enterprise Software Foundation OpenStack Platform 16.1 bug fix and enhancement advisory Rocky Enterprise Software Foundation OpenStack Platform provides the facilities for building, deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. For additional information about the items in this advisory, refer to the Technical Notes chapter of the Release Notes, https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.1/html/release_notes/chap-technical_notes Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-gflags, python-oauth2client, google-api-python-client, python-httplib2, python-uritemplate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation OpenStack Platform provides the facilities for building, deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. For additional information about the items in this advisory, refer to the Technical Notes chapter of the Release Notes, https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.1/html/release_notes/chap-technical_notes rocky-linux-8-aarch64-powertools-rpms python3-httplib2-0.10.3-4.el8.noarch.rpm 6e8b831ea4c97e85d08e061f6ed8f03ffd62a7ab0df8bc9b2f3222fd2c33e8b7 RLSA-2023:3661 Important: texlive security update The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. Security Fix(es): * texlive: arbitrary code execution allows document complied with older version (CVE-2023-32700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for texlive. This update affects Rocky Linux 9, Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. Security Fix(es): * texlive: arbitrary code execution allows document complied with older version (CVE-2023-32700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms texlive-lib-devel-20180414-29.el8_8.aarch64.rpm 9de7c731763b28a9ba00cfd015e2f7f5141b2481fd224a57b4cee24d8d55abff RLBA-2023:3845 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * NetworkManager brings down connection when the IPv6 link-local address is removed (BZ#2209355) * ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * NetworkManager brings down connection when the IPv6 link-local address is removed (BZ#2209355) * ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975) rocky-linux-8-aarch64-powertools-rpms NetworkManager-libnm-devel-1.40.16-3.el8_8.aarch64.rpm 9de945a92b44aaa378d82a612557bc53ed449d10b05d33b6be7cf61e7d06b6d4 RLSA-2023:4100 Important: bind9.16 security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind9.16. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms bind9.16-devel-9.16.23-0.14.el8_8.1.aarch64.rpm 41e522a2d796494c6854cb8333ae437b8abae69f4ed485f59a859aef8bf584e7 bind9.16-doc-9.16.23-0.14.el8_8.1.noarch.rpm 9e0afbfc91960e8fcdebe49b409519c4fa1243f58b39e1102f8a3c244a6a5a10 RLSA-2023:4176 Moderate: java-1.8.0-openjdk security and bug fix update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [rhel-8] (BZ#2219727) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [rhel-8] (BZ#2219727) rocky-linux-8-aarch64-powertools-rpms java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.382.b05-2.el8.aarch64.rpm 2946dcb9692203d17d6baee6a5630fe2f8b72c86c802d871ebc939b373b771ab java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.382.b05-2.el8.aarch64.rpm 8f4e3fb7a742ec4b82acc7325dce0429404512b2656bff1d24c5760eafa9d976 java-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el8.aarch64.rpm b3221175168fc04c5826d51ea2594c0cd314cd6760a8c982fbb1c68bc5bce0b6 java-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el8.aarch64.rpm ba1c6e4d6096c8eccd762bc8fe97afdaeb107fba20dc201b31e737f21de2c02d java-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el8.aarch64.rpm 2b7b426615751527f371458ec9d672811bf390f25881d6971a60f2a438110f91 java-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el8.aarch64.rpm aee2149789fc20a3a4e721e5212f5cc50f075e0148e353a82da975ce9884b881 java-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el8.aarch64.rpm 505828f36404fd44205bbefcfb800ad9041f0c4ebb433b7bea2afee0e0b3e067 java-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el8.aarch64.rpm cfe57958bfa077703489be3e231ea07f3b120d48ba5206beba7f79202587cf17 java-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el8.aarch64.rpm c2581a10123dccc6e4b95e7503c27aa047f77447c10ecb2d815fd2592904ffde java-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el8.aarch64.rpm 8a0676aacd235ab065d38883431f5adfcd5b6a4a5a91c761657bc2236daeaeb7 java-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el8.aarch64.rpm 5c0234ebc6dfaa1a26eeb90c962e9377cb116560903986e57e37a4e24b9dc6cb java-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el8.aarch64.rpm 0df71b9caf6233e1e22ce59091c8951cdb34ba06faa0349518761a9b5aa21a26 RLSA-2023:3847 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092) * HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305) * kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595) * block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236) * xfs: deadlock in xfs_btree_split_worker (BZ#2196390) * Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214) * mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284) Enhancement(s): * Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092) * HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305) * kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595) * block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236) * xfs: deadlock in xfs_btree_split_worker (BZ#2196390) * Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214) * mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284) Enhancement(s): * Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-477.15.1.el8_8.aarch64.rpm 1c039ead7a34762b4b657b36dc72cbf6c728c9eb4e590441b1ff2b460ea7b977 RLEA-2023:3849 iproute bug fix update The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es): * macvlan: Add bclim parameter (BZ#2209687) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es): * macvlan: Add bclim parameter (BZ#2209687) rocky-linux-8-aarch64-powertools-rpms iproute-devel-5.18.0-1.1.el8_8.aarch64.rpm 8d2257d5cdd3b06a19f08bacf04ac79f35c6bfdff96823f4a4ba348a7217349b RLSA-2023:3425 Important: cups-filters security update The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cups-filters. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms cups-filters-devel-1.20.0-29.el8_8.2.aarch64.rpm 69868778fb90249c2d1d37f184d1fa410dc6420e2dd24fc10bf1149837ee320d RLSA-2023:3582 Important: .NET 6.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.118 and .NET Runtime 6.0.18. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.118). (BZ#2212378) Security Fix(es): * dotnet: .NET Kestrel: Denial of Service processing X509 Certificates (CVE-2023-29331) * dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack (CVE-2023-29337) * dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption (CVE-2023-33128) * dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML (CVE-2023-24936) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.118 and .NET Runtime 6.0.18. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.118). (BZ#2212378) Security Fix(es): * dotnet: .NET Kestrel: Denial of Service processing X509 Certificates (CVE-2023-29331) * dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack (CVE-2023-29337) * dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption (CVE-2023-33128) * dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML (CVE-2023-24936) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el8_8.aarch64.rpm 4cc7c20ca703c83cf78ca15a899dd4eca67d0edaa169643d10c21ddb49485be3 RLSA-2023:3593 Important: .NET 7.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.107 and .NET Runtime 7.0.7. The following packages have been upgraded to a later upstream version: dotnet7.0 (7.0.107). (BZ#2211876) Security Fix(es): * dotnet: .NET Kestrel: Denial of Service processing X509 Certificates (CVE-2023-29331) * dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack (CVE-2023-29337) * dotnet: Elevation of privilege - TarFile.ExtractToDirectory ignores extraction directory argument (CVE-2023-32032) * dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption (CVE-2023-33128) * dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML (CVE-2023-24936) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.107 and .NET Runtime 7.0.7. The following packages have been upgraded to a later upstream version: dotnet7.0 (7.0.107). (BZ#2211876) Security Fix(es): * dotnet: .NET Kestrel: Denial of Service processing X509 Certificates (CVE-2023-29331) * dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack (CVE-2023-29337) * dotnet: Elevation of privilege - TarFile.ExtractToDirectory ignores extraction directory argument (CVE-2023-32032) * dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption (CVE-2023-33128) * dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML (CVE-2023-24936) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el8_8.aarch64.rpm 8887c82e7caa0487c1db241cd88928f6454487b008a05f2db49d1da80e0593d1 RLSA-2023:3594 Important: python3.11 security update Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3.11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3.11-debug-3.11.2-2.el8_8.1.aarch64.rpm 331ae9086b3f7b1b5b32dca52eb1240558859e2710a69b7103b189550aeccc7d python3.11-idle-3.11.2-2.el8_8.1.aarch64.rpm 1ad2f82d4d18878c20f07187d959e9d8a9bab4113438fbee4c0b377e415676c6 python3.11-test-3.11.2-2.el8_8.1.aarch64.rpm b6cae6f932d1b53de26033d08ff6bce3223f7244c435e737085e02ee37f45c64 RLBA-2023:3823 mutter bug fix update Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * [DELL 8.6 BUG]System hang after plug-in 4K monitor to Atomic dock (BZ#2209025) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * [DELL 8.6 BUG]System hang after plug-in 4K monitor to Atomic dock (BZ#2209025) rocky-linux-8-aarch64-powertools-rpms mutter-devel-3.32.2-69.el8_8.aarch64.rpm e6f7858818bbf0191a14cbe0e4bcbddfe88d970e7f8b9b60817ec088511c3ef2 RLSA-2023:3827 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libtiff-tools-4.0.9-28.el8_8.aarch64.rpm 3da7ddc42d48554111b1d264fed2a2cd6896a334ae9944e682c64e92daf273e1 RLBA-2023:3832 nmstate enhancement update Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Enhancement(s): * [Backport to 8.X] DHCP based installation shall allow creation network bonding and allowing custom/specifying routes with nmstate. (BZ#2213554) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Enhancement(s): * [Backport to 8.X] DHCP based installation shall allow creation network bonding and allowing custom/specifying routes with nmstate. (BZ#2213554) rocky-linux-8-aarch64-powertools-rpms nmstate-devel-1.4.4-2.el8_8.aarch64.rpm 28007faa3aedc1c67fc6fcfc9601f367d6694e78c562161923185ce7ae4b22bd RLBA-2023:3834 .NET 6.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.119 and Runtime 6.0.19 [rhel-8.8.0.z] (BZ#2216221) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.119 and Runtime 6.0.19 [rhel-8.8.0.z] (BZ#2216221) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.119-1.el8_8.aarch64.rpm 82d9f9e1caaa471fb57c859b5d478acb1c21ee9654c2004bc1d7424bbe1e5277 RLBA-2023:3835 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.108 and Runtime 7.0.8 [rhel-8.8.0.z] (BZ#2216225) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.108 and Runtime 7.0.8 [rhel-8.8.0.z] (BZ#2216225) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.108-1.el8_8.aarch64.rpm 2b4e86300ca7246199b6fbfcb32aa98812394d99d80e6f5c9fe8914b5c3d0f13 RLSA-2023:4058 Important: .NET 7.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. The following packages have been upgraded to a later upstream version: dotnet7.0 (SDK 7.0.109, Runtime 7.0.9). (BZ#2219633) Security Fix(es): * dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method (CVE-2023-33170) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. The following packages have been upgraded to a later upstream version: dotnet7.0 (SDK 7.0.109, Runtime 7.0.9). (BZ#2219633) Security Fix(es): * dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method (CVE-2023-33170) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el8_8.aarch64.rpm 6db1761b8cc67dd09c50d6cffb29aed7ff23c2785feca27f9bd18acccd07d26b RLSA-2023:4059 Important: .NET 6.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. The following packages have been upgraded to a later upstream version: dotnet6.0 (SDK 6.0.120, Runtime 6.0.20). (BZ#2219639) Security Fix(es): * dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method (CVE-2023-33170) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. The following packages have been upgraded to a later upstream version: dotnet6.0 (SDK 6.0.120, Runtime 6.0.20). (BZ#2219639) Security Fix(es): * dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method (CVE-2023-33170) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el8_8.aarch64.rpm 954da152bd262c898f1a615125fabcfef79cd1fd52f2c6c09dc8933a67b1c7e4 RLSA-2023:5144 Moderate: .NET 6.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.122 and .NET Runtime 6.0.22. Security Fix(es): * dotnet: Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.122 and .NET Runtime 6.0.22. Security Fix(es): * dotnet: Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el8_8.aarch64.rpm e7c6265f70fec383248621c3580c84ca5112609eb8229c4b171ad9b18dc8d88e RLSA-2023:5244 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * low memory deadlock with md devices and external (imsm) metadata handling - requires a kernfs notification backport (BZ#2208540) * Intel 8.9 BUG, SPR EMR FHF ACPI: Fix system hang during S3 wakeup (BZ#2218025) * OCS 4.8, cephfs kernel crash: mds_dispatch ceph_handle_snap unable to handle kernel NULL (BZ#2218271) * st_gmac: tx-checksum offload on vlan is not consistent with st_gmac interface (BZ#2219907) * refcount_t overflow often happens in mem_cgroup_id_get_online() (BZ#2221010) * avoid unnecessary page fault retires on shared memory types (BZ#2221100) * enable conntrack clash resolution for GRE (BZ#2223542) * ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (BZ#2224515) * libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227073) * Important iavf bug fixes July 2023 (BZ#2228161) * i40e error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228163) * oops on cifs_mount due to null tcon (BZ#2229128) * iptables argument "--suppl-groups" in extension "owner" does not work in Rocky Linux8 (BZ#2229715) * Hyper-V Rocky Linux 8: incomplete fc_transport implementation in storvsc causes null dereference in fc_timed_out() (BZ#2230743) * Withdrawal: GFS2: could not freeze filesystem: -16 (BZ#2231825) * Rocky Linux 8 Hyper-V: Excessive hv_storvsc driver logging with srb_status SRB_STATUS_INTERNAL_ERROR (0x30) (BZ#2231988) * Rocky Linux-8: crypto: rng - Fix lock imbalance in crypto_del_rng (BZ#2232215) * Intel 8.9 iavf: Driver Update (BZ#2232399) * Hyper-V Rocky Linux-8 hv_storvsc driver logging excessive storvsc_log events for storvsc_on_io_completion() function (BZ#2233227) Enhancement(s): * Intel 8.9 FEAT, EMR perf: Add EMR CPU PMU support (BZ#2230152) * Intel 8.9 FEAT, SPR EMR power: Add uncore frequency control driver (BZ#2230158) * Intel 8.9 FEAT EMR perf: RAPL PMU support on EMR (BZ#2230162) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * low memory deadlock with md devices and external (imsm) metadata handling - requires a kernfs notification backport (BZ#2208540) * Intel 8.9 BUG, SPR EMR FHF ACPI: Fix system hang during S3 wakeup (BZ#2218025) * OCS 4.8, cephfs kernel crash: mds_dispatch ceph_handle_snap unable to handle kernel NULL (BZ#2218271) * st_gmac: tx-checksum offload on vlan is not consistent with st_gmac interface (BZ#2219907) * refcount_t overflow often happens in mem_cgroup_id_get_online() (BZ#2221010) * avoid unnecessary page fault retires on shared memory types (BZ#2221100) * enable conntrack clash resolution for GRE (BZ#2223542) * ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (BZ#2224515) * libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227073) * Important iavf bug fixes July 2023 (BZ#2228161) * i40e error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228163) * oops on cifs_mount due to null tcon (BZ#2229128) * iptables argument "--suppl-groups" in extension "owner" does not work in Rocky Linux8 (BZ#2229715) * Hyper-V Rocky Linux 8: incomplete fc_transport implementation in storvsc causes null dereference in fc_timed_out() (BZ#2230743) * Withdrawal: GFS2: could not freeze filesystem: -16 (BZ#2231825) * Rocky Linux 8 Hyper-V: Excessive hv_storvsc driver logging with srb_status SRB_STATUS_INTERNAL_ERROR (0x30) (BZ#2231988) * Rocky Linux-8: crypto: rng - Fix lock imbalance in crypto_del_rng (BZ#2232215) * Intel 8.9 iavf: Driver Update (BZ#2232399) * Hyper-V Rocky Linux-8 hv_storvsc driver logging excessive storvsc_log events for storvsc_on_io_completion() function (BZ#2233227) Enhancement(s): * Intel 8.9 FEAT, EMR perf: Add EMR CPU PMU support (BZ#2230152) * Intel 8.9 FEAT, SPR EMR power: Add uncore frequency control driver (BZ#2230158) * Intel 8.9 FEAT EMR perf: RAPL PMU support on EMR (BZ#2230162) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-477.27.1.el8_8.aarch64.rpm 40784c33e2195e9d6886cf63e9ea2e46c2d95bc25fe8a022019b7fb5b13e3ded RLSA-2023:5353 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800) * libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801) * libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803) * libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800) * libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801) * libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803) * libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libtiff-tools-4.0.9-29.el8_8.aarch64.rpm c4ad0306f1abb169f56088fc4590f1658ab631a471f41e8846933fc71b8bff15 RLSA-2023:5455 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911) * glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) * glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806) * glibc: potential use-after-free in gaih_inet() (CVE-2023-4813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911) * glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) * glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806) * glibc: potential use-after-free in gaih_inet() (CVE-2023-4813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms glibc-benchtests-2.28-225.el8_8.6.aarch64.rpm 731eb88c6f36edc571c31f3f45a6115e220232ea3c9b66ee06d3405a85c72d08 glibc-nss-devel-2.28-225.el8_8.6.aarch64.rpm a30c801cfeff8f46eed95ddd1326373c53e7c11fa5f83d4801b4e2a952859ffe glibc-static-2.28-225.el8_8.6.aarch64.rpm 91970a7825428451bda57184ae2f011deee55643890f08bdf1db3ee15f9293b1 nss_hesiod-2.28-225.el8_8.6.aarch64.rpm 66bd2d69f6c9b13a09a54992ec2986b583542536d355f467e8b24f99d5528ff5 RLSA-2023:5463 Important: python3.11 security update Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3.11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3.11-debug-3.11.2-2.el8_8.2.aarch64.rpm d7a7b3cc62b7e17c9185bf0906ebbab3d07b1496f3edad0680cc8616b4cebe7c python3.11-idle-3.11.2-2.el8_8.2.aarch64.rpm 1d3c9eb54bcf97d2c0c489ad2b38a1c9888516307178951ecff98247aa6436ab python3.11-test-3.11.2-2.el8_8.2.aarch64.rpm 885c4ff0c4e9eade220a6b6f0bf463d8aa6d141130b39bcab3195f8bd256c193 RLSA-2023:4517 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101) * Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602) * LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375) * ice: ptp4l cpu usage spikes (BZ#2203285) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127) * macvlan: backports from upstream (BZ#2209686) * Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198) * Incorrect target abort handling causes iscsi deadlock (BZ#2211494) * swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658) * Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667) * Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373) * Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451) * Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189) * ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366) * xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281) * jitter: Fix RCT/APT health test during initialization (BZ#2215079) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498) * Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101) * Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602) * LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375) * ice: ptp4l cpu usage spikes (BZ#2203285) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127) * macvlan: backports from upstream (BZ#2209686) * Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198) * Incorrect target abort handling causes iscsi deadlock (BZ#2211494) * swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658) * Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667) * Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373) * Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451) * Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189) * ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366) * xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281) * jitter: Fix RCT/APT health test during initialization (BZ#2215079) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498) * Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-477.21.1.el8_8.aarch64.rpm 4088b9290a8f62ce47776bdc941d9770c9ec1a9af5c90f656e03a80656c8aaba RLBA-2023:4518 iscsi-initiator-utils bug fix update The iscsi-initiator-utils packages provide the server daemon for the Internet Small Computer System Interface (iSCSI) protocol, as well as the utility programs used to manage it. The iSCSI protocol is a protocol for distributed disk access using SCSI commands sent over Internet Protocol (IP) networks. Bug Fix(es): * Patch3 reverts a patch merged upstream (BZ#2215111) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iscsi-initiator-utils packages provide the server daemon for the Internet Small Computer System Interface (iSCSI) protocol, as well as the utility programs used to manage it. The iSCSI protocol is a protocol for distributed disk access using SCSI commands sent over Internet Protocol (IP) networks. Bug Fix(es): * Patch3 reverts a patch merged upstream (BZ#2215111) rocky-linux-8-aarch64-powertools-rpms iscsi-initiator-utils-devel-6.2.1.4-8.git095f59c.el8_8.aarch64.rpm 4185e4f6c56eb43d5bee3c69723030c7fbe956e9a9c295adbf4c33b2d4a2164c RLBA-2023:4521 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899) rocky-linux-8-aarch64-powertools-rpms NetworkManager-libnm-devel-1.40.16-4.el8_8.aarch64.rpm b099bfc052526614f86950444206f0921cfcbc9734c1d3b784952f8a60f4844f RLBA-2023:4525 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838) * SSSD enters failed state after heavy load in the system. (BZ#2219351) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838) * SSSD enters failed state after heavy load in the system. (BZ#2219351) rocky-linux-8-aarch64-powertools-rpms libsss_nss_idmap-devel-2.8.2-3.el8_8.aarch64.rpm 3374b1ec11e8674b3fcca1e10e39f183c30730c087e99a29e5ca1b5f954a8712 RLBA-2023:4528 crash bug fix update The crash packages provide the core analysis suite, which is a self-contained tool that can be used to investigate live systems, as well as kernel core dumps created by the kexec-tools packages or the Rocky Linux kernel. Bug Fix(es): * The crash utility results in segmentation fault when non-panicking CPUs fail to get stopped at panic. (BZ#2213678) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The crash packages provide the core analysis suite, which is a self-contained tool that can be used to investigate live systems, as well as kernel core dumps created by the kexec-tools packages or the Rocky Linux kernel. Bug Fix(es): * The crash utility results in segmentation fault when non-panicking CPUs fail to get stopped at panic. (BZ#2213678) rocky-linux-8-aarch64-powertools-rpms crash-devel-7.3.2-4.el8_8.1.aarch64.rpm 221672002de2ea1be362027f8a13be0a5259e6a7884c8eccc93c95d8e5dc98c7 RLBA-2023:4533 mutter bug fix update Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * Barcode scanner result is not shown correctly on gnome-terminal. (BZ#2218521) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * Barcode scanner result is not shown correctly on gnome-terminal. (BZ#2218521) rocky-linux-8-aarch64-powertools-rpms mutter-devel-3.32.2-70.el8_8.aarch64.rpm 21cab5d4b7ec77eb211e1e94c73bbdbee59827e3966c0a40e528b35506483bd2 RLBA-2023:4538 java-11-openjdk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.20.0.8-3.el8_8.aarch64.rpm c6a122a1835a2bbf62b836c982a43a4ec8dcac285e829dffeb023920f1d0dd4f java-11-openjdk-demo-slowdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 84c1fbeca45f002ee0d2f4d431fc58e03305a972499a23d1ae8edb3c1d532c24 java-11-openjdk-devel-fastdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 55b89b26bc3010020f81c13c5cbe18df940a23c8fc01d873cf24b6ab3bf75ae8 java-11-openjdk-devel-slowdebug-11.0.20.0.8-3.el8_8.aarch64.rpm d2c72012326af55d9a930dcbb174864192e3f9b38b55a18e629c2de444c4e8e0 java-11-openjdk-fastdebug-11.0.20.0.8-3.el8_8.aarch64.rpm fb90aa2f08312f4e4ab642c508004a993a6d882df67e10f1512525e209952159 java-11-openjdk-headless-fastdebug-11.0.20.0.8-3.el8_8.aarch64.rpm ada82fb8631f641511d8255023a96e93d3feff462546d1f3cb6f86ef3bb10cb9 java-11-openjdk-headless-slowdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 8974cbe8d920baa16d729647974c86932a6073132095694d458b4a16cac461e4 java-11-openjdk-jmods-fastdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 9af3b5caa8ef49b05fcdc5a5f90c8408d84c77a906aee530accfd91f3202b86c java-11-openjdk-jmods-slowdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 27582d8d9926208a6180ca79d070f79c6c051cda12f33cced0b0ae79af8bcf0e java-11-openjdk-slowdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 38c63863b288ddf9072d989ea7e956ab3f87eb2ebbd164f151ed13b7a36cd488 java-11-openjdk-src-fastdebug-11.0.20.0.8-3.el8_8.aarch64.rpm d660d458ba43c39e11db970ee06c5d00d4652883703b61d828ec4b0e67f6f907 java-11-openjdk-src-slowdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 50b5c185da3dd7f2aa9bf8ae621d8e3c76975925752d1e41d9fc7551e1fdc16b java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 297eff811dfda74f48f35a13536939acd8b4592ef29d0f831257f6504f356bb4 java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-3.el8_8.aarch64.rpm 453721cfbef38dab5f3aca498d90235eceebad170d9962e85ab199a949a28f36 RLSA-2023:4643 Important: .NET 7.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.110 and .NET Runtime 7.0.10. Security Fix(es): * dotnet: RCE under dotnet commands (CVE-2023-35390) * dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack (CVE-2023-38180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.110 and .NET Runtime 7.0.10. Security Fix(es): * dotnet: RCE under dotnet commands (CVE-2023-35390) * dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack (CVE-2023-38180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el8_8.aarch64.rpm 2950128a0fd8bb144b25ef1d64680542206a42dfc060a1fa39215f33d883321c RLSA-2023:4645 Important: .NET 6.0 security, bug fix, and enhancement update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.121 and .NET Runtime 6.0.21. Security Fix(es): * dotnet: RCE under dotnet commands (CVE-2023-35390) * dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack (CVE-2023-38180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.121 and .NET Runtime 6.0.21. Security Fix(es): * dotnet: RCE under dotnet commands (CVE-2023-35390) * dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack (CVE-2023-38180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el8_8.aarch64.rpm 6cb8eb00c5556efa5a8c86b9b105dc8330df622f00b4dc600b24b4c2309d4b77 RLSA-2023:5742 Moderate: java-11-openjdk security and bug fix update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2237170) * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. * The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210, Rocky Linux-2763) * The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (Rocky Linux-13559) * The jcmd tool is now provided by the java-11-openjdk-headless package, rather than java-11-openjdk-devel, to make it more accessible (Rocky Linux-13566) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2237170) * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. * The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210, Rocky Linux-2763) * The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (Rocky Linux-13559) * The jcmd tool is now provided by the java-11-openjdk-headless package, rather than java-11-openjdk-devel, to make it more accessible (Rocky Linux-13566) rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 54d436990fb4b01f99dca52e9ea81664e1c97464fa1fe272977c135b5bf80680 java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 2d13edb20c7bb9c47e50fabb2ce3950d9310223ade1a5604bd115849a961f2a0 java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 22abd045ee637e88fb77ea99bfdbc47ff96a35390410fddeb13f158f0796ffb4 java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el8_8.aarch64.rpm be5555ffc56eb526850afa0dbe093c8cb822f6d283ff9245be25ae7633029c48 java-11-openjdk-fastdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 51dd2da9418b79c609d8872138c62cdbcc27d4bee8545e433519f0024b069c69 java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 617332c700026ce003801c7a82909dcafd7a95052e6cca7f418667a46be7df35 java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 3455ca6d6ace968d980668699ebfbadea5085a4b53c3290f690737a78fe40b18 java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 025e07d22a1c8922ace3f3fde7a3a545dd52ec551dd5e605e37f7dcc6a054d3f java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el8_8.aarch64.rpm aad15e05d64ab5d6b36cf0c50d094c2371886ee888d948fef5defd1289e59345 java-11-openjdk-slowdebug-11.0.21.0.9-2.el8_8.aarch64.rpm fabf238b589bb41aefd8816a4de8bd9c63172ada3e6a185276d5a4e38e0aa009 java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el8_8.aarch64.rpm d446a04d4d2e97f76232beb5e61e8d1abc6e2694fec5a4a7f5766cd6784d136d java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 3d0cd97402fd6d2bfa87e9139f3044b875daf39090e55c2a2145cdc3e4a02c81 java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 8003873ebf11a2cccd39bc421619848f5882c3ccf5d47f8c7adcd7905fdd6d0d java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el8_8.aarch64.rpm 18a4d5e639e97b5bc4adf5a327b15939190495aa1f7b8356ed7a0aadf8236f42 RLSA-2023:6245 Moderate: .NET 6.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.124 and .NET Runtime 6.0.24. Security Fix(es): * dotnet: Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.124 and .NET Runtime 6.0.24. Security Fix(es): * dotnet: Denial of Service with Client Certificates using .NET Kestrel (CVE-2023-36799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el8_8.aarch64.rpm 84b71a0a97524aebc0121db56b6b700d464cefc6cb507a580fe499b72df3b96b RLBA-2023:7185 nftables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms nftables-devel-1.0.4-3.el8_9.aarch64.rpm 9ab23928364e036ede7748a846b13cf532a5e1c5308c57972301a56eebbb08e2 RLBA-2023:7186 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libmount-devel-2.32.1-43.el8.aarch64.rpm e6bef5f767f726c5a90ea034c98776e64dced72b70a5d33400e98ec1e03473a6 RLSA-2023:7187 Low: procps-ng security update The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms procps-ng-devel-3.3.15-14.el8.aarch64.rpm ab8e32d8444dc8ca1287459407a55df6cb4445536a6bcabff3d7fd85c74c9cf8 RLSA-2023:7189 Moderate: fwupd security update The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms fwupd-devel-1.7.8-2.el8.rocky.0.1.aarch64.rpm 0108beec4b0506c133e79eb2aff211f11e6aedf3a1f7247a4f0d476d8567ce70 RLSA-2023:7190 Moderate: avahi security update Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms avahi-compat-howl-0.7-21.el8.aarch64.rpm e1717446421f1372b2bc594db01be9b4d6c502d0e715b2c0af43d65e905be45d avahi-compat-howl-devel-0.7-21.el8.aarch64.rpm ed9896729c4817fd81960eeaae670f715d50aca6a692553c6677662ace2d071a avahi-compat-libdns_sd-0.7-21.el8.aarch64.rpm 3e9b81f1df11b3fc20e89bb35e38104b4bab46d963e94cb093e6490949bd6095 avahi-compat-libdns_sd-devel-0.7-21.el8.aarch64.rpm bc06d66e4015d140a8e52dc5c9f7748c4df5606222ca62f272751e105c01ad46 avahi-devel-0.7-21.el8.aarch64.rpm e01b5103cb831b828f583ab0cf2e33e42684cef87ebe9bb80626ff1dc03b75b8 avahi-glib-devel-0.7-21.el8.aarch64.rpm fd83b841f86d1ec1da8fd9a26a8854b76b4baacd7374e5b4c23d2e4871184b0c avahi-gobject-devel-0.7-21.el8.aarch64.rpm fb80482c244b3f1bcc09f0117f20a0dd5d318e36454e1f8c67a49c342c9ad4a1 avahi-ui-0.7-21.el8.aarch64.rpm cf42a00d14dfc197152c5391778c88e4abd1ef1e813c927ec8d07ea519077b75 avahi-ui-devel-0.7-21.el8.aarch64.rpm 3eb97c58e15f6997190b34e932ec6dae751606477c0fbd20e0aabe54b270ce03 RLBA-2023:7191 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms device-mapper-devel-1.02.181-13.el8_9.aarch64.rpm 459049b8c3e6d6847f3d5374c0ee67f62ea468a2521ec04b605a080b435da678 device-mapper-event-devel-1.02.181-13.el8_9.aarch64.rpm 66e2df163fa735e7b10350b2d87fca0c19e98746d66a7df354011ec6671a8bb5 lvm2-devel-2.03.14-13.el8_9.aarch64.rpm a8238a02239f843bc3fb68f55cf5b34bf3410c28ef5c7b8f6e77251057a15713 RLBA-2023:7210 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414) * SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414) * SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302) rocky-linux-8-aarch64-powertools-rpms libsss_nss_idmap-devel-2.9.1-4.el8_9.aarch64.rpm cba4e3aed2c19b37515649cabdc0b16001ef5933fcbcdb5ade5aeab982fe9786 RLSA-2021:1852 Moderate: ghostscript security, bug fix, and enhancement update The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. The following packages have been upgraded to a later upstream version: ghostscript (9.27). (BZ#1874523) Security Fix(es): * ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS (CVE-2020-14373) * ghostscript: buffer overflow in lprn_is_black() in contrib/lips4/gdevlprn.c could result in a DoS (CVE-2020-16287) * ghostscript: buffer overflow in pj_common_print_page() in devices/gdevpjet.c could result in a DoS (CVE-2020-16288) * ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a DoS (CVE-2020-16290) * ghostscript: buffer overflow in contrib/gdevdj9.c could result in a DoS (CVE-2020-16291) * ghostscript: buffer overflow in mj_raster_cmd() in contrib/japanese/gdevmjc.c could result in a DoS (CVE-2020-16292) * ghostscript: NULL pointer dereference in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c could result in a DoS (CVE-2020-16293) * ghostscript: buffer overflow in epsc_print_page() in devices/gdevepsc.c could result in a DoS (CVE-2020-16294) * ghostscript: NULL pointer dereference in clj_media_size() in devices/gdevclj.c could result in a DoS (CVE-2020-16295) * ghostscript: buffer overflow in GetNumWrongData() in contrib/lips4/gdevlips.c could result in a DoS (CVE-2020-16296) * ghostscript: buffer overflow in FloydSteinbergDitheringC() in contrib/gdevbjca.c could result in a DoS (CVE-2020-16297) * ghostscript: buffer overflow in mj_color_correct() in contrib/japanese/gdevmjc.c could result in a DoS (CVE-2020-16298) * ghostscript: division by zero in bj10v_print_page() in contrib/japanese/gdev10v.c could result in a DoS (CVE-2020-16299) * ghostscript: buffer overflow in tiff12_print_page() in devices/gdevtfnx.c could result in a DoS (CVE-2020-16300) * ghostscript: buffer overflow in okiibm_print_page1() in devices/gdevokii.c could result in a DoS (CVE-2020-16301) * ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a privilege escalation (CVE-2020-16302) * ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation (CVE-2020-16303) * ghostscript: buffer overflow in image_render_color_thresh() in base/gxicolor.c could result in a DoS (CVE-2020-16304) * ghostscript: NULL pointer dereference in devices/gdevtsep.c could result in a DoS (CVE-2020-16306) * ghostscript: NULL pointer dereference in devices/vector/gdevtxtw.c and psi/zbfont.c could result in a DoS (CVE-2020-16307) * ghostscript: buffer overflow in p_print_image() in devices/gdevcdj.c could result in a DoS (CVE-2020-16308) * ghostscript: buffer overflow in lxm5700m_print_page() in devices/gdevlxm.c could result in a DoS (CVE-2020-16309) * ghostscript: division by zero in dot24_print_page() in devices/gdevdm24.c could result in a DoS (CVE-2020-16310) * ghostscript: buffer overflow in GetNumSameData() in contrib/lips4/gdevlips.c could result in a DoS (CVE-2020-17538) * ghostscript: buffer overflow in cif_print_page() in devices/gdevcif.c could result in a DoS (CVE-2020-16289) * ghostscript: buffer overflow in pcx_write_rle() in contrib/japanese/gdev10v.c could result in a DoS (CVE-2020-16305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. The following packages have been upgraded to a later upstream version: ghostscript (9.27). (BZ#1874523) Security Fix(es): * ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS (CVE-2020-14373) * ghostscript: buffer overflow in lprn_is_black() in contrib/lips4/gdevlprn.c could result in a DoS (CVE-2020-16287) * ghostscript: buffer overflow in pj_common_print_page() in devices/gdevpjet.c could result in a DoS (CVE-2020-16288) * ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a DoS (CVE-2020-16290) * ghostscript: buffer overflow in contrib/gdevdj9.c could result in a DoS (CVE-2020-16291) * ghostscript: buffer overflow in mj_raster_cmd() in contrib/japanese/gdevmjc.c could result in a DoS (CVE-2020-16292) * ghostscript: NULL pointer dereference in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c could result in a DoS (CVE-2020-16293) * ghostscript: buffer overflow in epsc_print_page() in devices/gdevepsc.c could result in a DoS (CVE-2020-16294) * ghostscript: NULL pointer dereference in clj_media_size() in devices/gdevclj.c could result in a DoS (CVE-2020-16295) * ghostscript: buffer overflow in GetNumWrongData() in contrib/lips4/gdevlips.c could result in a DoS (CVE-2020-16296) * ghostscript: buffer overflow in FloydSteinbergDitheringC() in contrib/gdevbjca.c could result in a DoS (CVE-2020-16297) * ghostscript: buffer overflow in mj_color_correct() in contrib/japanese/gdevmjc.c could result in a DoS (CVE-2020-16298) * ghostscript: division by zero in bj10v_print_page() in contrib/japanese/gdev10v.c could result in a DoS (CVE-2020-16299) * ghostscript: buffer overflow in tiff12_print_page() in devices/gdevtfnx.c could result in a DoS (CVE-2020-16300) * ghostscript: buffer overflow in okiibm_print_page1() in devices/gdevokii.c could result in a DoS (CVE-2020-16301) * ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a privilege escalation (CVE-2020-16302) * ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation (CVE-2020-16303) * ghostscript: buffer overflow in image_render_color_thresh() in base/gxicolor.c could result in a DoS (CVE-2020-16304) * ghostscript: NULL pointer dereference in devices/gdevtsep.c could result in a DoS (CVE-2020-16306) * ghostscript: NULL pointer dereference in devices/vector/gdevtxtw.c and psi/zbfont.c could result in a DoS (CVE-2020-16307) * ghostscript: buffer overflow in p_print_image() in devices/gdevcdj.c could result in a DoS (CVE-2020-16308) * ghostscript: buffer overflow in lxm5700m_print_page() in devices/gdevlxm.c could result in a DoS (CVE-2020-16309) * ghostscript: division by zero in dot24_print_page() in devices/gdevdm24.c could result in a DoS (CVE-2020-16310) * ghostscript: buffer overflow in GetNumSameData() in contrib/lips4/gdevlips.c could result in a DoS (CVE-2020-17538) * ghostscript: buffer overflow in cif_print_page() in devices/gdevcif.c could result in a DoS (CVE-2020-16289) * ghostscript: buffer overflow in pcx_write_rle() in contrib/japanese/gdev10v.c could result in a DoS (CVE-2020-16305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ghostscript-doc-9.27-11.el8.noarch.rpm f221bd7039893215b0704e74c99d7ca6dc842e26a460050aad879597f4d96f63 ghostscript-tools-dvipdf-9.27-11.el8.aarch64.rpm 458c0fcc73eca7836f53ef38c5b9f4fdab4cd1f21be52903a7ce9991cba2071b ghostscript-tools-fonts-9.27-11.el8.aarch64.rpm 849a7e24ba4d33f581d1a6e7224b7309de707032d12c2c90dfe1486a9b691724 ghostscript-tools-printing-9.27-11.el8.aarch64.rpm 9a41b256b91a3f896c12b341401b2c468a2f8675eb686744b344efab167294b2 libgs-devel-9.27-11.el8.aarch64.rpm c6a7791c69a21a5021b20764293945bd27a3dd774410bc950af9ae927e4f560a RLSA-2023:7057 Moderate: yajl security update Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. Security Fix(es): * yajl: Memory leak in yajl_tree_parse function (CVE-2023-33460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for yajl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. Security Fix(es): * yajl: Memory leak in yajl_tree_parse function (CVE-2023-33460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms yajl-devel-2.1.0-12.el8.aarch64.rpm 0b8490035d3a8b498953b37ac7d1e8ec54865d63076d9a5bc80db6e35d0f9a80 RLBA-2023:7204 mutter bug fix update Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * Do not use DMA-BUFs for screensharing when the other side doesn't support it (JIRA:Rocky Linux-11227) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * Do not use DMA-BUFs for screensharing when the other side doesn't support it (JIRA:Rocky Linux-11227) rocky-linux-8-aarch64-powertools-rpms mutter-devel-3.32.2-71.el8_9.1.aarch64.rpm 4aa2aa9caedbfa2907a33b78653f5b976290b13db629371775839a0c4fcdafe1 RLBA-2023:7133 libfabric bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libfabric-devel-1.18.0-1.el8.aarch64.rpm 1d7683def747f8e92db01cdef566638180f6534f8102388be5d854afa3e9fb2c RLBA-2023:7135 libldb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-ldb-devel-2.7.2-3.el8.aarch64.rpm 459a91a4efe60b2cecd6b08334e7cd3d56e1368911d9560d88f7f61806de75c0 python-ldb-devel-common-2.7.2-3.el8.aarch64.rpm 5d016ac4df3be4b7cbdeaa8afe6e9f9f9573e60bdb97ef483a723df6fa6dc20f RLBA-2023:7297 nghttp2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libnghttp2-devel-1.33.0-5.el8_8.aarch64.rpm 2ce12131092d504ee4231866ca4f6af9a8e1d957e42e7d1196331b307adff78b nghttp2-1.33.0-5.el8_8.aarch64.rpm 8d1a9130bc36638adf47955c6de26439888e08adeba5ec5e1169e1c31f07ffb0 RLBA-2023:6920 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libblockdev-crypto-devel-2.28-4.el8.aarch64.rpm 83551e11204c26df850a4d47984781a9b80ba28ba1de8e1ff66255bc7a71d8f7 libblockdev-devel-2.28-4.el8.aarch64.rpm a6590d31dde307f9f1ceba09222802e3c7d61d8551e974ec751ced73143f53a7 libblockdev-fs-devel-2.28-4.el8.aarch64.rpm d1559ab3052f92c9184f143d2574074448a33f04c5e96058c84dfa7d8471f6a8 libblockdev-loop-devel-2.28-4.el8.aarch64.rpm d947ee13227b8c10760ddd89291b4ba7e34eae7f24c8ace5c9544cf3ecabfe77 libblockdev-lvm-devel-2.28-4.el8.aarch64.rpm 4f288b85e97856bedb1e3c30e7482d901d4b4bd8b0b56588239769110e356b89 libblockdev-mdraid-devel-2.28-4.el8.aarch64.rpm e0b5cb41faa7e7badd244cd8cdc01230055dcb3a6afc13e3cdf36eb516408678 libblockdev-part-devel-2.28-4.el8.aarch64.rpm 5fd02162c99589ab1cf6fd700876c0eb3323f91b899979dc7f8d3ee51d5e54e5 libblockdev-swap-devel-2.28-4.el8.aarch64.rpm 8757091a44ca8ecb060381363b8a4877f88ae68ab587898994229790126bd936 libblockdev-utils-devel-2.28-4.el8.aarch64.rpm 6a7cf5a15a0d05e6901859971700fe1db3c74c4763133b367d710fd547571fa8 libblockdev-vdo-devel-2.28-4.el8.aarch64.rpm 1ef314450ddd25b76e6347fa3a058010b8fa18f63bd6895e265c8150d2084009 RLBA-2023:6957 anaconda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms anaconda-widgets-devel-33.16.9.4-1.el8.rocky.0.1.aarch64.rpm af6e511c2ea3e862b6b0d0d0453f904214f9f95a2600483052674398ebd6393b RLBA-2023:7044 openwsman bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openwsman. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libwsman-devel-2.6.5-10.el8.aarch64.rpm 919e8bc8582c4683faae792847b2f9a3d97e7d81f9305f6fbf275619f92af379 RLSA-2023:7256 Moderate: dotnet7.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.114 and .NET Runtime 7.0.14. Security Fix(es): * dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand (CVE-2023-36049) * dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms (CVE-2023-36558) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.114 and .NET Runtime 7.0.14. Security Fix(es): * dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand (CVE-2023-36049) * dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms (CVE-2023-36558) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el8_9.aarch64.rpm f5909051a40e2e92334069b8e071ea32113d28a1dd8c74fe498c12725d5cf8a2 RLSA-2023:7258 Moderate: dotnet6.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.125 and .NET Runtime 6.0.25. Security Fix(es): * dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand (CVE-2023-36049) * dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms (CVE-2023-36558) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.125 and .NET Runtime 6.0.25. Security Fix(es): * dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand (CVE-2023-36049) * dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms (CVE-2023-36558) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el8_9.aarch64.rpm d8e959ad274b31abfe7dd1389827c47eddbd049346414ba47fac9cf3b591f2ca RLSA-2023:7549 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163) * kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812) * kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178) * kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884) * kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886) * kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750) * bpf_jit_limit hit again (BZ#2243011) * HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163) * kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812) * kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178) * kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884) * kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886) * kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750) * bpf_jit_limit hit again (BZ#2243011) * HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-513.9.1.el8_9.aarch64.rpm cc7b329f6ca2c3d1beb769362428096767259f929087ba519c0fc6b8413e233e RLSA-2023:7841 Important: gstreamer1-plugins-bad-free security update GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms gstreamer1-plugins-bad-free-devel-1.16.1-2.el8_9.aarch64.rpm ead987894d2a4c031495102c3688b41e36a4b29aacbaecd737b0e42146e93e13 RLSA-2023:7836 Moderate: avahi security update Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket (CVE-2021-3468) * avahi: Reachable assertion in avahi_dns_packet_append_record (CVE-2023-38469) * avahi: Reachable assertion in avahi_escape_label (CVE-2023-38470) * avahi: Reachable assertion in dbus_set_host_name (CVE-2023-38471) * avahi: Reachable assertion in avahi_rdata_parse (CVE-2023-38472) * avahi: Reachable assertion in avahi_alternative_host_name (CVE-2023-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket (CVE-2021-3468) * avahi: Reachable assertion in avahi_dns_packet_append_record (CVE-2023-38469) * avahi: Reachable assertion in avahi_escape_label (CVE-2023-38470) * avahi: Reachable assertion in dbus_set_host_name (CVE-2023-38471) * avahi: Reachable assertion in avahi_rdata_parse (CVE-2023-38472) * avahi: Reachable assertion in avahi_alternative_host_name (CVE-2023-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms avahi-compat-howl-0.7-21.el8_9.1.aarch64.rpm 3d8bca590482d485c1295493f3c9d3a7ebb2fd4a8f03757f7e1997104ac6f508 avahi-compat-howl-devel-0.7-21.el8_9.1.aarch64.rpm c86d11fd32621d0d8e8a61269d1d8153b5bf370d0007392853e7a2b73bcac741 avahi-compat-libdns_sd-0.7-21.el8_9.1.aarch64.rpm d1a020ac79d4c65f2d5ae191d1cc426cae84ffc0c0b0136b952521a036a4866b avahi-compat-libdns_sd-devel-0.7-21.el8_9.1.aarch64.rpm 0388d6851cabe614949121ee296fd1949f6c6dc86b05e447bfae47e779d077fa avahi-devel-0.7-21.el8_9.1.aarch64.rpm 877626b9b051aadb44d25fb8e9836ec06161a437f7c23cc6f4d95b065c9214ec avahi-glib-devel-0.7-21.el8_9.1.aarch64.rpm 722b79528cf287cc15f91f58fa0ac840dbefcc5c3c0b459c72c7963d61cdfc66 avahi-gobject-devel-0.7-21.el8_9.1.aarch64.rpm 2f8cebe65053a31cdf7ab9c32746faffde83caa6375d8a0c0048ecf70e002f7a avahi-ui-0.7-21.el8_9.1.aarch64.rpm 6b5b0b22abe397087aec366ac607def71852a38786b8d925a9fc57916c50571d avahi-ui-devel-0.7-21.el8_9.1.aarch64.rpm b4d6e1f73769d580d8e31269717c4d993be723a30bda2537a65f50aeacc8142f RLSA-2024:0150 Important: .NET 8.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.101 and .NET Runtime 8.0.1. Security Fix(es): * dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) (CVE-2024-0056) * dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057) * dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.101 and .NET Runtime 8.0.1. Security Fix(es): * dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) (CVE-2024-0056) * dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057) * dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el8_9.aarch64.rpm fc64b3ab8f44fede5d9c56be0938079d45d1bba2fefca76b6dd8faf9516555b6 RLSA-2024:0157 Important: .NET 7.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.115 and .NET Runtime 7.0.15. Security Fix(es): * dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) (CVE-2024-0056) * dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057) * dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.115 and .NET Runtime 7.0.15. Security Fix(es): * dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) (CVE-2024-0056) * dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057) * dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el8_9.aarch64.rpm 20fb515fe11d0284f6ac2ac468b571fc10c1b6f715f60d144e0b28ef4b7afb20 RLSA-2024:0158 Important: .NET 6.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.126 and .NET Runtime 6.0.26. Security Fix(es): * dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) (CVE-2024-0056) * dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057) * dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.126 and .NET Runtime 6.0.26. Security Fix(es): * dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) (CVE-2024-0056) * dotnet: X509 Certificates - Validation Bypass across Azure (CVE-2024-0057) * dotnet: .NET Denial of Service Vulnerability (CVE-2024-21319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el8_9.aarch64.rpm a741d48e964886c7a27c818833217ff1ba010b6195a3c6823ed3e5d7536430fa RLSA-2024:0827 Important: .NET 8.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.102 and .NET Runtime 8.0.2. Security Fix(es): * dotnet: Denial of Service in SignalR server (CVE-2024-21386) * dotnet: Denial of Service in X509Certificate2 (CVE-2024-21404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.102 and .NET Runtime 8.0.2. Security Fix(es): * dotnet: Denial of Service in SignalR server (CVE-2024-21386) * dotnet: Denial of Service in X509Certificate2 (CVE-2024-21404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el8_9.aarch64.rpm ded1a073a9f5cff79921379cc273bf983f29ca458bba20992f679ceb042d08fd RLBA-2024:0899 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * Excessive logging to sssd_nss and sssd_be in multi-domain AD forest (JIRA:Rocky Linux-19212) * latest sssd breaks logging in via XDMCP for LDAP/Kerberos users (JIRA:Rocky Linux-19994) * SSSD GPO lacks group resolution on hosts (JIRA:Rocky Linux-21085) * Make sure 8.9.z/9.3.z doesn't build 'passkey' code (JIRA:Rocky Linux-21164) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * Excessive logging to sssd_nss and sssd_be in multi-domain AD forest (JIRA:Rocky Linux-19212) * latest sssd breaks logging in via XDMCP for LDAP/Kerberos users (JIRA:Rocky Linux-19994) * SSSD GPO lacks group resolution on hosts (JIRA:Rocky Linux-21085) * Make sure 8.9.z/9.3.z doesn't build 'passkey' code (JIRA:Rocky Linux-21164) rocky-linux-8-aarch64-powertools-rpms libsss_nss_idmap-devel-2.9.1-4.el8_9.5.aarch64.rpm 8bbd37952782cb32e2153343dabf84af9b9fd9513448cde4301ce8e733eaea0c RLSA-2024:0806 Important: dotnet7.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.116 and .NET Runtime 7.0.16. Security Fix(es): * dotnet: Denial of Service in SignalR server (CVE-2024-21386) * dotnet: Denial of Service in X509Certificate2 (CVE-2024-21404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.116 and .NET Runtime 7.0.16. Security Fix(es): * dotnet: Denial of Service in SignalR server (CVE-2024-21386) * dotnet: Denial of Service in X509Certificate2 (CVE-2024-21404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el8_9.aarch64.rpm 4c67c9a732734042634578bbecf7b0bb67eea22008838ea2a348f4fbadb6bb7e RLBA-2024:1298 .NET 6.0 bugfix update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK SDK_VERSION and .NET Runtime RUNTIME_VERSION. Bug Fix(es): * Update .NET 6.0 to SDK 6.0.128 and Runtime 6.0.28 [rhel-8.9.0.z] (Rocky Linux-27538) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK SDK_VERSION and .NET Runtime RUNTIME_VERSION. Bug Fix(es): * Update .NET 6.0 to SDK 6.0.128 and Runtime 6.0.28 [rhel-8.9.0.z] (Rocky Linux-27538) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.128-1.el8_9.aarch64.rpm 2cc801d6530a50a23b046ff502128727cec811f0c29b6f27628a13e75f02dc2f RLSA-2024:1308 Moderate: .NET 7.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.117 and .NET Runtime 7.0.17. Security Fix(es): * dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support (CVE-2024-21392) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.117 and .NET Runtime 7.0.17. Security Fix(es): * dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support (CVE-2024-21392) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el8_9.aarch64.rpm 95e6c16613b51b423ca0f9c9ab76cdeb2747be168ae0be29c90283374d4b35c0 RLSA-2024:1311 Moderate: .NET 8.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.103 and .NET Runtime 8.0.3. Security Fix(es): * dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support (CVE-2024-21392) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.103 and .NET Runtime 8.0.3. Security Fix(es): * dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support (CVE-2024-21392) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.103-1.el8_9.aarch64.rpm cf659c8b63b97287ec923cfc1f4f20f983f76a1b0ed82a8642fc66d26fa8e494 RLBA-2024:1604 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600) * [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600) * [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968) rocky-linux-8-aarch64-powertools-rpms NetworkManager-libnm-devel-1.40.16-15.el8_9.aarch64.rpm 8a3aa3e27210333c51938b329fd3fb4ba141a360a72761648d07e2db643267b2 RLBA-2024:1606 util-linux bug fix update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es): * lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es): * lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562) rocky-linux-8-aarch64-powertools-rpms libmount-devel-2.32.1-44.el8_9.1.aarch64.rpm 9f38c69dc270cee7c89e438cac1c1e76544a414ae7cd86b28d66d3b8467320c1 RLSA-2024:1607 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931) * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) Bug Fix(es): * OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010) * Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055) * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766) * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930) * rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479) * ceph: several cap and snap fixes (JIRA:Rocky Linux-20909) * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063) * unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719) * [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101) * kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954) * backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331) * ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496) Enhancement(s): * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931) * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) Bug Fix(es): * OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010) * Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055) * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766) * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930) * rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479) * ceph: several cap and snap fixes (JIRA:Rocky Linux-20909) * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063) * unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719) * [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101) * kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954) * backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331) * ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496) Enhancement(s): * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-513.24.1.el8_9.aarch64.rpm af9d1a92595a805b4e9a558e2bb211fa8058f03cbbb5a68d0b282e2b76a832b3 RLSA-2024:1608 Moderate: opencryptoki security update The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Security Fix(es): * opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Security Fix(es): * opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms opencryptoki-devel-3.21.0-10.el8_9.aarch64.rpm 126d27396355d5423f2553d839aee7b5f0fa46c82e067b03cb795ee297708c14 RLBA-2024:1600 evolution bug fix update Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. Bug Fix(es): * Evolution - Composer: Cursor jumps to the starting line when "return" key is pressed at the end of the line. (JIRA:Rocky Linux-29199) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. Bug Fix(es): * Evolution - Composer: Cursor jumps to the starting line when "return" key is pressed at the end of the line. (JIRA:Rocky Linux-29199) rocky-linux-8-aarch64-powertools-rpms evolution-devel-3.28.5-25.el8_9.aarch64.rpm 97970d7055359081469088f81f928c8cc7173870b633546c38cff30d35ac93b6 RLBA-2024:1732 .NET 6.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.129 and Runtime 6.0.29 [rhel-8.9.0.z] (Rocky Linux-31196) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.129 and Runtime 6.0.29 [rhel-8.9.0.z] (Rocky Linux-31196) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.129-1.el8_9.aarch64.rpm e187378728c8a1c87763e8bde9eb0fae0d75dd24a24f2ece454deccff241acbb RLBA-2024:1733 .NET 8.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 8.0 to SDK 8.0.104 and Runtime 8.0.4 [rhel-8.9.0.z] (Rocky Linux-31206) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 8.0 to SDK 8.0.104 and Runtime 8.0.4 [rhel-8.9.0.z] (Rocky Linux-31206) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.104-1.el8_9.aarch64.rpm e83eff7caf12e16dce0b6c5d3d6585b44c4db700cc88454f5700a756e269cc6d RLBA-2024:1735 .NET 7.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.118 and Runtime 7.0.18 [rhel-8.9.0.z] (Rocky Linux-31201) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.118 and Runtime 7.0.18 [rhel-8.9.0.z] (Rocky Linux-31201) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.118-1.el8_9.aarch64.rpm bb9c705222527329deda12b38de6bc0cc820dff97997f10a41ed22626794785e RLSA-2024:1781 Important: bind9.16 security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517) * bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679) * bind9: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind9.16. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517) * bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679) * bind9: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms bind9.16-devel-9.16.23-0.16.el8_9.2.aarch64.rpm 266e39bf05ee21e39c41afe0285c3c0b3f135586434e5b40ef3d4d443cd84e3e bind9.16-doc-9.16.23-0.16.el8_9.2.noarch.rpm fdf475d9a7194a0f0cdd62be2525f5de6c5bc07c479703021b816dc63c52e047 RLSA-2024:1818 Moderate: java-1.8.0-openjdk security update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.412.b08-2.el8.aarch64.rpm 941a6f51d060b1df5093fb729eda43c48b631686b981cd442c4b68e62c56f7e9 java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.412.b08-2.el8.aarch64.rpm 77dcc2a1d03f26a5ce4c11976e630af337eb4a56c01cc939f6a7feee274bf652 java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el8.aarch64.rpm f4f74898c47bc45d449519002441ce5cf17c8c0426484e5711becfaad566abbe java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el8.aarch64.rpm 1104d63c7172de58ef0e0da9281200bf1526e9c2c94ed7a843381d48850757d0 java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el8.aarch64.rpm edc348bf7c57bdfd01ac241fa9e4a2d4767e187d427d84f2bffdd364dfe0d2c9 java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el8.aarch64.rpm cd3972ed1a4d0fa55d9d9d61c1bdae1a2277913ba30eb003d05f3b0f65a137cb java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el8.aarch64.rpm d5578154a956282ec53beff2928c2f9484750c3189ad912cdcd38edeb580c4e4 java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el8.aarch64.rpm 8d47f44dcbcfa63975a1395b09cba121c4b9278f336d34478b77cd9948560cff java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el8.aarch64.rpm 390b764f5f1cd8a1a5a75bbfeab56bc3bdfe89a2b3bca8626cb20edf511bd200 java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el8.aarch64.rpm a71a1504f2b83e3c0995bbdf79f6d2464a8c62c43fcfcace1b56770e69c2006d java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el8.aarch64.rpm 30e6abc44931b99203b4490b9a7aa3534f967fa14dc5fd847534f3a7026426f6 java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el8.aarch64.rpm 9879a92a695358d51d200cf9d73d1576b21a62160e4219d80da6c470a4a4283b RLSA-2024:1828 Moderate: java-21-openjdk security update The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el8.aarch64.rpm eec41abd761ae01debd48fd04db60e68a2bf11accdfde2eb7094d38c1e4f7917 java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el8.aarch64.rpm 96c5c641ae9a8ae6592d8531582b9e44c2797d0bc5a2e222b53b1ce19cb5f851 java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el8.aarch64.rpm 58ebf548819f8e11aeec61aa7f4356e6ffa64b066c89d65c7e24ab0df53cf72b java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el8.aarch64.rpm 38d95382140ccccf1bd4f452f88a23a2782e3bf2ac418b447d9b71ffac69fcf2 java-21-openjdk-fastdebug-21.0.3.0.9-1.el8.aarch64.rpm 463259408f8dee23ca7607bd5aa8f4e5bbcef578022e5aade3bb3e60095a78c6 java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el8.aarch64.rpm de46f7d5291b0c1236bebf90ce1404634b2cfb1e61160b1b8368305802d52450 java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el8.aarch64.rpm 391f2ee55865703cba94446a2dc7dd46bcf69a6b5e4594c3ff6214229265af72 java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el8.aarch64.rpm 65a9b986eda3bdc319f81e69992d32e183d1182d8740c11759fe5234f12d7d04 java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el8.aarch64.rpm ef7dd0689d74424776cb40933fdace21ce69e276278c990429683b79d896be55 java-21-openjdk-slowdebug-21.0.3.0.9-1.el8.aarch64.rpm e98a646be2961336d53179b30be53e81c3f21887757b82121813f7bb31396d15 java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el8.aarch64.rpm 3d99617fa7c18905d3343baa14c3951b9e55fb6005f5b55f791fcf7f9a02d7e5 java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el8.aarch64.rpm 8ceb0e12a34f70c540b4f7642bf50422139a67023c12c6065945dcf1b40404c2 java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el8.aarch64.rpm 7eb366a71d28a81e60f8c9d667e9d002e4ed9df2614cc560befee461538d339b java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el8.aarch64.rpm 1ddb591c46a8946755a34dc012d1715efee24195543fcd4073658c3d7107f5e2 RLSA-2024:1822 Moderate: java-11-openjdk security update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el8.aarch64.rpm 32485ef703f16d823713122ac13b9fbbb5db2e20abb0d786fe3148e9b95bc39d java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el8.aarch64.rpm 725a82d23e55b22a5e34585849c10c09b8ab381bc79ffd2d592ea686ce2e2bca java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el8.aarch64.rpm 34a4f0538a16bc292484854317b804178e5cc4671452d69bd7f18ff85eaf555e java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el8.aarch64.rpm 47a9c512bacf9001985c6b8f268c10d0ceb47db6d983b9b4d12a667b5aeb9e2d java-11-openjdk-fastdebug-11.0.23.0.9-3.el8.aarch64.rpm bb58c742bf9828dcb805acbd227c6edb785874a774761d45274dc94c0d53e89c java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el8.aarch64.rpm dce8fc531a3ca222fb1d8ea7cfbdea2dfb85ab7ecaf9d087e97531d15d9d2c8e java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el8.aarch64.rpm a4e8300171f3be3acb8e539c41fdb5bcc9eacb2902502b22b71101932360608a java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el8.aarch64.rpm 2d4b555f3c985112fd2bfb4bbd7635e61df853851d180cba848c679403fdac8b java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el8.aarch64.rpm 8fac6f3aa61b0f4479b7ec1998cef2be8600081ecab93e21b4c67f896f31c410 java-11-openjdk-slowdebug-11.0.23.0.9-3.el8.aarch64.rpm a4ce023b0de234234a774c55e60b726e7b91f184cda0f8d8d960dc40d0bcf06b java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el8.aarch64.rpm 94798aa1b67e36619a45b98088b7d8f5ee4070c1e1eceea9a6d633b7732bbc3c java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el8.aarch64.rpm cd3e0fefc3fedef326b1781cd0ca9404cec3fe604bfe4e6351244e95ddbf2c4f java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el8.aarch64.rpm fe5f6db03a538327bf2307f3799871bd8809993fec70ca9eeae03c934df39754 java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el8.aarch64.rpm 8f0859f45634d9d8eeb3737f6c2a88b55fa659e35f0ba99f13d01d5d88508a5e RLSA-2024:2722 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms glibc-benchtests-2.28-236.el8_9.13.aarch64.rpm b6accd9abd0479930ec167be2d4e4865d94cfeb28b148cad65e527f3e2ac629b glibc-nss-devel-2.28-236.el8_9.13.aarch64.rpm 5a0054cba3fceb0f5503c61ec7d7a4b145285ab775275c6b4294358c01332fc1 glibc-static-2.28-236.el8_9.13.aarch64.rpm ccab4baf384a61c857120bcf29247dfb23a4bcee97392a341b5536c556a57d67 nss_hesiod-2.28-236.el8_9.13.aarch64.rpm 24f32191f8fc9369efd063c3462e97a9014d25fc0036ad1b501a9364a7e2ddc5 RLBA-2024:1602 nftables bug fix update nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * nftables counter (JIRA:Rocky Linux-2596) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * nftables counter (JIRA:Rocky Linux-2596) rocky-linux-8-aarch64-powertools-rpms nftables-devel-1.0.4-4.el8.aarch64.rpm a3681ad771f2433f464d2c222cd39c959ce72369ba9a5037778f3b793a66c49e RLBA-2024:3137 libtracefs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libtracefs-devel-1.3.1-3.el8.aarch64.rpm c4079b95a25c810bef4299de06fc7e86cb5bc16b22c6a6ae6f568c08f003bf24 RLSA-2024:3138 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-553.el8_10.aarch64.rpm 546f35d0b4b1cd5edd48db58f05da644cc2896db9780ae84e581760a2d81fa75 RLBA-2024:3152 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms glibc-benchtests-2.28-251.el8_10.2.aarch64.rpm 3e286ffd0bbc14179fac84dfdb9f5d5feca332b57cb2ecb296e0dafa5918ef7d glibc-nss-devel-2.28-251.el8_10.2.aarch64.rpm 4cc1805c6d731c4d364c73c130c94aaf4ef1d0e47c50ed6ba66b45e4f2498643 glibc-static-2.28-251.el8_10.2.aarch64.rpm dc8f0f1609855039996cfec78e0d2e3eb40216a22baf3ca6b94dac130e935f14 nss_hesiod-2.28-251.el8_10.2.aarch64.rpm 56289b37d4d13ccbd9e9299897d36f749395dceacdec43f96178ac11a699d7a6 RLBA-2024:3179 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms avahi-compat-howl-0.7-27.el8.aarch64.rpm c64049455ee6a16e2eb9b66b90fc2149e2a43d611a99dc38e796ad50324c3aa4 avahi-compat-howl-devel-0.7-27.el8.aarch64.rpm a4ec7f1f2d458d4564deaae4507697667d1449715957e79633cee8923069c34a avahi-compat-libdns_sd-0.7-27.el8.aarch64.rpm ab16054a1bccd71420c27392c58666f22989d1e4de19108c5cef8ea5b43aa58a avahi-compat-libdns_sd-devel-0.7-27.el8.aarch64.rpm 673bece7876ae6aa41e760f3e157d9f7efb182935c57d7bb4418ccb2754fe8fc avahi-devel-0.7-27.el8.aarch64.rpm 56323e377aa73a33c09ffbc16bc18138f79a846139e65e1dc2e9902558abb5f0 avahi-glib-devel-0.7-27.el8.aarch64.rpm acc0878178d4dd711d381164410eb305ff079ac211239e707c947b817e23aab9 avahi-gobject-devel-0.7-27.el8.aarch64.rpm 7099e338bafb5e1b34bcd476606e7c2f9dcddb1fb9b7caf0b25a468b18525d2a avahi-ui-0.7-27.el8.aarch64.rpm 791feee828ddbc12c40cce082495071c8a21969067c1b788b88e69b6b777c427 avahi-ui-devel-0.7-27.el8.aarch64.rpm c47bd754e6bd83cf78d34b1b20e84652c6aad7663590635191bada8e2155efee RLBA-2024:3186 libldb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-ldb-devel-2.8.0-0.el8.aarch64.rpm 11816d6cc0d1fc072d24e7bc0e3c90db95e4d7b3a8ba0dbf43b29cefa3c32031 python-ldb-devel-common-2.8.0-0.el8.aarch64.rpm fcb46081aee57cf993249b624d8dd6de05ef4b06033ca8765d81cadfa34593a9 RLBA-2024:3190 trousers bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms trousers-devel-0.3.15-2.el8.aarch64.rpm f6f5d96b3ed871687cd56b7ab3dcee8bed091b510809471a5e1f712c19afc931 RLBA-2024:3197 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms librepo-devel-1.14.2-5.el8.aarch64.rpm b0535c33bb96f923c7703ff283c35bd36703d82997776f8a4c88e6c91d3faa1f RLBA-2024:3199 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms opencryptoki-devel-3.22.0-3.el8.aarch64.rpm 78582d53f330f27f04c99c3997f6b3e062135234170f3a48faaa02615952082f RLBA-2024:3230 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms file-devel-5.33-26.el8.aarch64.rpm f3821ffe5cb3742787e713311596013b357bf2ee64f325b6d1a33c110b55f082 RLBA-2024:3237 bash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms bash-devel-4.4.20-5.el8.aarch64.rpm 12d7e78c13a6f81dbd8eec8751869c911f11635927ce3bc23b90cc76ba5440b0 RLBA-2024:3232 freeipmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms freeipmi-devel-1.6.14-2.el8.aarch64.rpm 60c86637fa2c34d69824dfa27213321ec3c0a0efec68221dd3e7da69c88a7f1a RLEA-2024:3235 iproute bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms iproute-devel-6.2.0-6.el8_10.aarch64.rpm ad2718a9213473932bcc970f34c2212cb5e649f6f50e5cc7eafaff124e02da2d RLSA-2024:3270 Moderate: sssd security update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libsss_nss_idmap-devel-2.9.4-3.el8_10.aarch64.rpm b6b9564484b21af3310a771b52bb1d04cc627690f18d363bd0cc184ec0fea8a9 RLBA-2024:3272 gcc bug fix update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426) rocky-linux-8-aarch64-powertools-rpms gcc-plugin-devel-8.5.0-22.el8_10.aarch64.rpm 689ee2527b22e55c28f819e6be55f608fe2f1f9273d83dcc450226dc425fc83f libstdc++-static-8.5.0-22.el8_10.aarch64.rpm 798700622cff5a590edcc4328eec8745ca7efd722648750092e6c480acd42cac RLSA-2024:3341 Moderate: gdk-pixbuf2 security update The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms gdk-pixbuf2-xlib-2.36.12-6.el8_10.aarch64.rpm 69ab91152f95ea7631e52c941bd042e2ef9aa1af588cbeecdb34f174b0eabe3e gdk-pixbuf2-xlib-devel-2.36.12-6.el8_10.aarch64.rpm be130d35ac4cde05b58f1689de2f9bebf920e95086803db0c2ae88c5498c5620 RLSA-2024:3344 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms glibc-benchtests-2.28-251.el8_10.2.aarch64.rpm 3e286ffd0bbc14179fac84dfdb9f5d5feca332b57cb2ecb296e0dafa5918ef7d glibc-nss-devel-2.28-251.el8_10.2.aarch64.rpm 4cc1805c6d731c4d364c73c130c94aaf4ef1d0e47c50ed6ba66b45e4f2498643 glibc-static-2.28-251.el8_10.2.aarch64.rpm dc8f0f1609855039996cfec78e0d2e3eb40216a22baf3ca6b94dac130e935f14 nss_hesiod-2.28-251.el8_10.2.aarch64.rpm 56289b37d4d13ccbd9e9299897d36f749395dceacdec43f96178ac11a699d7a6 RLSA-2024:3618 Moderate: kernel update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744) * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: use after free in i2c (CVE-2019-25162) * kernel: i2c: validate user data in compat ioctl (CVE-2021-46934) * kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055) * kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118) * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610) * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643) * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642) * kernel: i2c: i801: Don&#39;t generate an interrupt on bus reset (CVE-2021-47153) * kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port &#34;disable&#34; sysfs attribute (CVE-2024-26933) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059) * kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013) * kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744) * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: use after free in i2c (CVE-2019-25162) * kernel: i2c: validate user data in compat ioctl (CVE-2021-46934) * kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055) * kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118) * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610) * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643) * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642) * kernel: i2c: i801: Don&#39;t generate an interrupt on bus reset (CVE-2021-47153) * kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port &#34;disable&#34; sysfs attribute (CVE-2024-26933) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059) * kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013) * kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-553.5.1.el8_10.aarch64.rpm 55bf36a74902e23b4efdf842d7a23fc7437cbc3f46681a303592c3ecc1cae08d RLBA-2024:2959 evolution and evolution-data-server bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution, evolution-data-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms evolution-data-server-doc-3.28.5-24.el8.noarch.rpm 5e96a029757ac6f5ee8f04b22c9d730dcd2a71cbbef1ac09ef365c385cbe37db evolution-data-server-perl-3.28.5-24.el8.aarch64.rpm 744e56f2b323c9d07b1e665b208ebb184494495812fb5d4836803af107950236 evolution-data-server-tests-3.28.5-24.el8.aarch64.rpm b6c8215905331685f2bc12c8e422741f7bd424246916faf019ecf1657e7d2e2c evolution-devel-3.28.5-26.el8_10.aarch64.rpm b904dfb9f5920b5ad4d3f55eab7038897bdaed346596605aa71ae22289ef828f RLBA-2024:2969 mutter bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mutter. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms mutter-devel-3.32.2-72.el8.aarch64.rpm 966d0ee8d74ad788fbb30598a4981794fd4c2dfda5b281ae4c085b4a97769201 RLSA-2024:2966 Low: ghostscript security update The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: Divide by zero in eps_print_page in gdevepsn.c (CVE-2020-21710) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: Divide by zero in eps_print_page in gdevepsn.c (CVE-2020-21710) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ghostscript-doc-9.27-12.el8.noarch.rpm 37446c6c6232b76f6e92db9eebddb1214c018c039131fbea630204ed0ff0fa0c ghostscript-tools-dvipdf-9.27-12.el8.aarch64.rpm cd05b0b0daa8b0703d6a95a8df8567b8f8ec267379a5008dc92dfabfc81089ca ghostscript-tools-fonts-9.27-12.el8.aarch64.rpm 0b4f3eeebbaf348ea0d2086c15d7a596e3b4a43960fca346e86ab4343dce14bc ghostscript-tools-printing-9.27-12.el8.aarch64.rpm 268c5c221745aea3edeae45ca3b7bc0a3f9b530e0eff577937dc55ba1fa5d420 libgs-devel-9.27-12.el8.aarch64.rpm c53b0347f0cc4edc2546472972204ad2f405777fbc969fc83c7921d8e63b6983 RLBA-2024:2972 ibus-typing-booster bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-typing-booster. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ibus-typing-booster-tests-2.1.0-7.el8.noarch.rpm a9b0783e9bb4286f31f3a4a6dedd84dd088d02770dbabbc99c5fd22ee15a5617 RLBA-2024:2971 nmstate bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms nmstate-devel-1.4.5-2.el8_9.aarch64.rpm 7118cf4c83793780e585eb77d1c1285f694ff8decd1aa90d45f7951a9673ea02 RLBA-2024:2976 ibus-table bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ibus-table. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms ibus-table-devel-1.9.18-8.el8.noarch.rpm 204233f915531efa708342d228322967b983fb2c226a4c2adf062db51c8884ac ibus-table-tests-1.9.18-8.el8.noarch.rpm 7fe4d15119c9f2711b7507d87bf06a7afd062f469a3576e1a6508f8652f9067e RLBA-2024:2978 poppler-data bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for poppler-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms poppler-data-devel-0.4.9-2.el8.noarch.rpm 1a5299c129ce88967efcd7998f0e97ce919a89a0958842d6cf18ba11cae85ec9 RLBA-2024:2983 gtk-vnc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gtk-vnc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gtk-vnc2-devel-0.9.0-3.el8.aarch64.rpm 99f1c02593c6c14c19766e19c2eda5a8d39d5cf4adaf4405b062cda1c2df37ea gvnc-devel-0.9.0-3.el8.aarch64.rpm c431323d0eda47fe6d86e262933ce89b8a50704e8981a11eb87c7e4d728a22db RLBA-2024:2993 jq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms jq-devel-1.6-8.el8.aarch64.rpm c2ee4fa185b305c64a89d8c0ec782be84f116c8a88cf20dc0445129e2568ab33 RLBA-2024:2998 libblockdev bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libblockdev. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libblockdev-crypto-devel-2.28-6.el8.aarch64.rpm fb89db456fe372e9a6e948ec2a866453e1912aeba5ccc96cddad4dfc2ec4dbc5 libblockdev-devel-2.28-6.el8.aarch64.rpm 170595ab93d1c53f5eaa6b0f01aef81282992846a814df5489f33422090e66c5 libblockdev-fs-devel-2.28-6.el8.aarch64.rpm 459a984403eae11398e5938c2217b8e932b6285fbaf070c9c90816f5f33523bf libblockdev-loop-devel-2.28-6.el8.aarch64.rpm 715429549e822d35a6fc6c9cfad59f5df5baf521597d086630b80ad19db94aa3 libblockdev-lvm-devel-2.28-6.el8.aarch64.rpm dd4941d5009caf6629038743939e2c74bab088e4ffbe10428debf2a21fe69638 libblockdev-mdraid-devel-2.28-6.el8.aarch64.rpm ddd7d7be5d927734ba8caf1f0fd65894f416f0532aaaa03c49cf375632b3fc7f libblockdev-part-devel-2.28-6.el8.aarch64.rpm c67cf1fbdd9389aa869ad884c40d5ac57f3de6b46f63d7f9e16792685ac892de libblockdev-swap-devel-2.28-6.el8.aarch64.rpm e493d6ee20f2245b0b06a3ef8df4589887402495e06040067a0bd9ae60e63ca9 libblockdev-utils-devel-2.28-6.el8.aarch64.rpm a847dab70fc4fae2aff6e1d785bbe7457982b05c4e17ada016a2a6e2eae50adb libblockdev-vdo-devel-2.28-6.el8.aarch64.rpm 072c64d1cafb727f905c80acec430f474933678a8cfdfa4d2b1d7c77fa7c67ef RLSA-2024:3005 Moderate: python-pillow security update The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (CVE-2023-44271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (CVE-2023-44271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3-pillow-devel-5.1.1-20.el8.aarch64.rpm 916c9272b9462c4fd23bd01926ae4e01514ac9f68edb78183c657738d4898f82 python3-pillow-doc-5.1.1-20.el8.noarch.rpm 0e36a5739e4cfa5af102a208aeafc752218dd46a8d0f87b57801e42aca7b8b3d python3-pillow-tk-5.1.1-20.el8.aarch64.rpm 08713cf12496af729749599ab72ac8344db028e2adf38f08bfc647c4c12b405e RLSA-2024:3008 Important: pmix security update The Process Management Interface (PMI) provides process management functions for MPI implementations. PMI Exascale (PMIx) provides an extended version of the PMI standard specifically designed to support clusters up to and including exascale sizes. Security Fix(es): * pmix: race condition allows attackers to obtain ownership of arbitrary files (CVE-2023-41915) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pmix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Process Management Interface (PMI) provides process management functions for MPI implementations. PMI Exascale (PMIx) provides an extended version of the PMI standard specifically designed to support clusters up to and including exascale sizes. Security Fix(es): * pmix: race condition allows attackers to obtain ownership of arbitrary files (CVE-2023-41915) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms pmix-devel-2.2.5-3.el8.aarch64.rpm 6bb91a47e1466b75bdcc32315ba8baff917ec8f564a226ca8f857034c23c9a47 RLBA-2024:3034 papi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for papi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms papi-testsuite-5.6.0-20.el8.aarch64.rpm 702fc48b8a5f3d31138b8ebc47ed94f9b097eed420c79a69615383e902d65019 RLBA-2024:3048 anaconda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for anaconda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms anaconda-widgets-devel-33.16.10.5-1.el8.rocky.0.1.aarch64.rpm 440a55e2ebce295da00c07ffe842b4127b64117d55bc1aa62f9425c758453c4e RLBA-2024:3052 oniguruma bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for oniguruma. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms oniguruma-devel-6.8.2-3.el8.aarch64.rpm f02cc1e0d4748dbc6c451329d43132beb6931862ef44f026486ba13e64d5fad3 RLSA-2024:3060 Moderate: gstreamer1-plugins-bad-free security update GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video (CVE-2023-40474) * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio (CVE-2023-40475) * gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite (CVE-2023-40476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video (CVE-2023-40474) * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio (CVE-2023-40475) * gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite (CVE-2023-40476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms gstreamer1-plugins-bad-free-devel-1.16.1-4.el8.aarch64.rpm 01d22e53015b4f1e74a3d6ce747b3388fa2f7dafb00359dde1a62e5cf0e4ad2b RLSA-2024:3059 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libtiff-tools-4.0.9-31.el8.aarch64.rpm 10565cf3fafa8c60a6cebf132a0a84fb696d592c580c70df1af6562aa8e1b280 RLSA-2024:3066 Moderate: exempi security update Exempi provides a library for easy parsing of XMP metadata. Security Fix(es): * exempi: denial of service via opening of crafted audio file with ID3V2 frame (CVE-2020-18651) * exempi: denial of service via opening of crafted webp file (CVE-2020-18652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for exempi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exempi provides a library for easy parsing of XMP metadata. Security Fix(es): * exempi: denial of service via opening of crafted audio file with ID3V2 frame (CVE-2020-18651) * exempi: denial of service via opening of crafted webp file (CVE-2020-18652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms exempi-devel-2.4.5-4.el8.aarch64.rpm 7c02559348b8d74f973e93b6b7bae2954eb67e7eabd0c994b089cf022c547b1e RLBA-2024:3064 libtimezonemap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtimezonemap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libtimezonemap-devel-0.4.5.1-5.el8.aarch64.rpm 952ec22d7991d1b86583fa73ae89b20176441eab8ab77f99af53ebb399545574 RLBA-2024:3078 python3.12-wheel bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3.12-wheel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms python3.12-wheel-wheel-0.41.2-3.el8.noarch.rpm efda60741544e46a72c25fd8a8f84c1747a82422e3a981e535677783768b49e5 RLBA-2024:3123 dovecot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dovecot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms dovecot-devel-2.3.16-5.el8.aarch64.rpm a5d2fe68d9207bc34faf52ec4d9a504837fa1fdc44b0fae39af51ba733211dcd RLBA-2024:3134 dpdk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dpdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms dpdk-devel-23.11-1.el8.aarch64.rpm 253862fd8321dad042831a5c4d46375a21cfde4fb03e813c94dea7d05ffe26d9 RLSA-2024:3258 Moderate: xorg-x11-server security update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms xorg-x11-server-devel-1.20.11-23.el8_10.aarch64.rpm 377c3950dc68054228b239fbdee76b9f380943911b65b1d78767b6a3992a4c3c xorg-x11-server-source-1.20.11-23.el8_10.noarch.rpm 76cebb28a2c2f8fb457b2008277bfeb14b064915f0fe00459167770e2359c56a RLBA-2024:3273 .NET 6.0 bugfix update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.130 and Runtime 6.0.30 (Rocky Linux-35309) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.130 and Runtime 6.0.30 (Rocky Linux-35309) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.130-1.el8_10.aarch64.rpm 2e582de81e1722738e9729284970cf6fd220af2c469326ae9ee352b2def7a032 RLSA-2024:3340 Important: .NET 7.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.119 and .NET Runtime 7.0.19. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet7.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.119 and .NET Runtime 7.0.19. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el8_10.aarch64.rpm 99d01f3d88a37baab1c309c3ef7dc969b7275fa2f6c0dc9f1996671d3d8bd43c RLSA-2024:3345 Important: .NET 8.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el8_10.aarch64.rpm 3401f6d6d132b962c646c5ff15cffda64e422ff7273ddd7866e15f426fb490cd RLBA-2024:3239 kronosnet bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kronosnet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-powertools-rpms libknet1-1.28-1.el8.aarch64.rpm 11a4e3bcd97c446b6496e01dc2e1c393d8230da8a28da07777cacf5ed99d8ed4 libknet1-devel-1.28-1.el8.aarch64.rpm 1d8b964942b8a1790e49ae929ef44f817238a78957ddcf93a37808fb00b2d9cf RLSA-2024:3961 Important: flatpak security update Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Security Fix(es): * flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for flatpak. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Security Fix(es): * flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms flatpak-devel-1.12.9-1.el8_10.aarch64.rpm ec35f6503e264ba261528aa32f25511af31287dd8b0e02c39e8a0dae964474e3 RLSA-2024:4000 Important: ghostscript security update The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: OPVP device arbitrary code execution via custom Driver library (CVE-2024-33871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: OPVP device arbitrary code execution via custom Driver library (CVE-2024-33871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms ghostscript-doc-9.27-13.el8_10.noarch.rpm 3fb55532e743ac2ab2cb52239b3238686dbcf4e15136d325437c97520bf9ab62 ghostscript-tools-dvipdf-9.27-13.el8_10.aarch64.rpm 60868ed506125e4a56b937609fc6595df10624123fee8d262b0ee7d2d0ea6466 ghostscript-tools-fonts-9.27-13.el8_10.aarch64.rpm 03726f837dbf2e3366238aba75eca31c6346570c1502acb2ff7bc0f1fee00bcb ghostscript-tools-printing-9.27-13.el8_10.aarch64.rpm d29602c0233439485a67eea3c329709f93c178d27b2f15514259f4dea18b512c libgs-devel-9.27-13.el8_10.aarch64.rpm d13736250d55271ff133ad8e3e7c47622caf6dec1f944e3ffd873b689a292f81 RLSA-2024:4211 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361) * Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048) * [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130) * Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361) * Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048) * [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130) * Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-553.8.1.el8_10.aarch64.rpm ae27f7c45f203fec94ef16a9a0759c8cbc9eacf17f83c5b7442be22e8c56a5b1 RLBA-2024:4213 xorg-x11-server bug fix update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Bug Fix(es): * Xorg crashes with malloc(): unaligned tcache chunk detected (Rocky Linux-40471) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xorg-x11-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Bug Fix(es): * Xorg crashes with malloc(): unaligned tcache chunk detected (Rocky Linux-40471) rocky-linux-8-aarch64-powertools-rpms xorg-x11-server-devel-1.20.11-24.el8_10.aarch64.rpm 62e8cab8edfe19c82177b7f94fd2caa70d3a80759a9c329903b78d11df6542b5 xorg-x11-server-source-1.20.11-24.el8_10.noarch.rpm b8a019e4a1ad51ad42ffde50e3b1e1ba57804172aff8993ee57cd586a7234ccd RLSA-2024:4227 Moderate: python-pillow security update The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: buffer overflow in _imagingcms.c (CVE-2024-28219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-pillow. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: buffer overflow in _imagingcms.c (CVE-2024-28219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3-pillow-devel-5.1.1-21.el8_10.aarch64.rpm d4014b67a6e27de83a173c754869d0ab3eeeb2d05ecb034cff8e161c9250b46c python3-pillow-doc-5.1.1-21.el8_10.noarch.rpm 569116bdbe9340f13baa816214d4ae7ed53d41c3c56c4bf2ebadc150a8e31cc0 python3-pillow-tk-5.1.1-21.el8_10.aarch64.rpm 5f1dc62cb41565a1676529158cc2d8a59ccfc4e3d0894daca02f59a6b5086a11 RLBA-2024:4232 Bug fix of nmstate Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es): * Applying dns configuration to nodes using NMstate make node unreachable [rhel-8.10.z] (JIRA:Rocky Linux-33059) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nmstate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es): * Applying dns configuration to nodes using NMstate make node unreachable [rhel-8.10.z] (JIRA:Rocky Linux-33059) rocky-linux-8-aarch64-powertools-rpms nmstate-devel-1.4.6-2.el8_10.aarch64.rpm cacfd06dd16234b5816d51f705300327dcd3124432b7e6958ffbbd0cb2c4e713 RLBA-2024:4234 jq update Bug Fix(es): * JQ findings from static application security testing (Rocky Linux-37827) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * JQ findings from static application security testing (Rocky Linux-37827) rocky-linux-8-aarch64-powertools-rpms jq-devel-1.6-9.el8_10.aarch64.rpm ba2b08b28b9e2d7842ce5ba3c6fdad06aae4fb1ab6cf31ef32ec92519debcaa7 RLSA-2024:4451 Important: dotnet8.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7. Security Fix(es): * dotnet: DoS in System.Text.Json (CVE-2024-30105) * dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264) * dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7. Security Fix(es): * dotnet: DoS in System.Text.Json (CVE-2024-30105) * dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264) * dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el8_10.aarch64.rpm 9381d867ab4a0e82f9f34fa222acf8a12f8942d4364476a9599e871cfdf8100b RLSA-2024:4573 Important: java-21-openjdk security update The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147) * OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131) * OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138) * OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140) * OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147) * OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131) * OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138) * OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140) * OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el8.aarch64.rpm 057b9262cbdd495681fe6b0f2a37b4d486eccc1b71562f8f17cb21faeb950772 java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el8.aarch64.rpm 6edb40d2c7c689d531af60f4085439705b6bf0f0be6aa1773a22aed73d662207 java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el8.aarch64.rpm 80c70f4f934c79e9eec7a21c44f154f696480ee7b32a9c3409c6019ab7355162 java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el8.aarch64.rpm 6ba6b59b0263dd4ecdf7c43d28180fdfb6dcb64fb6319cbaeb969a0bd8417928 java-21-openjdk-fastdebug-21.0.4.0.7-1.el8.aarch64.rpm 1ff2b4bf2f60e4276a5d176c67ca85dc2d13e2d18874df8c623510272cb93fde java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el8.aarch64.rpm 3678a8a15b5a0a4ae83569382127971b61a653ad186f137e065aeb5d545cda69 java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el8.aarch64.rpm 96abda1ed43244415f36b7f3eb4fe5a58f2e43f49d7dc727c6852905f3281d29 java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el8.aarch64.rpm 6a6d708038c3a1d07fa93b9297f4e9bf8d9460563d89459219f2e8ade1746b50 java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el8.aarch64.rpm d6684b840b9c0927433fb174bcdffe1d8bd1a39c988e1169b180e7e7a284b44d java-21-openjdk-slowdebug-21.0.4.0.7-1.el8.aarch64.rpm d7134009a85fee3eb012bea366d8779873a15a8ebbe759ba55a5b5084d73eadf java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el8.aarch64.rpm c695edfd30f361a8b603b7d33f835c7bb7bd9feb332390e58648b2c3c80b3fbe java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el8.aarch64.rpm 9f10bda62306091682f24437b3362c8586b50a8571721afeeac5b794aefc8b57 java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el8.aarch64.rpm 12a274dcc7abad8034bb3c18a5581fdaaecc72247429869f66f402da7277dae7 java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el8.aarch64.rpm ff7b6c118b02327e8225b57fc634eb9fd96454bad324aa89eb1950fbf0d4dfc8 RLSA-2024:4617 Important: qt5-qtbase security update Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Security Fix(es): * qtbase: qtbase: Delay any communication until encrypted() can be responded to (CVE-2024-39936) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for qt5-qtbase. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Security Fix(es): * qtbase: qtbase: Delay any communication until encrypted() can be responded to (CVE-2024-39936) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms qt5-qtbase-static-5.15.3-8.el8_10.aarch64.rpm 8d8712ee8411c9c2f4224426638a01882462021f643d620afd20039304d43030 RLSA-2024:5101 Important: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451) * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939) * kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622) * kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669) * kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802) * kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843) * kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878) * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653) * kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: ext4: fix corruption during on-line resize (CVE-2024-35807) * kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801) * kernel: dyndbg: fix old BUG_ON in &gt;control parser (CVE-2024-35947) * kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893) * kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876) * kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864) * kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845) * (CVE-2023-28746) * (CVE-2023-52847) * (CVE-2021-47548) * (CVE-2024-36921) * (CVE-2024-26921) * (CVE-2021-47579) * (CVE-2024-36927) * (CVE-2024-39276) * (CVE-2024-33621) * (CVE-2024-27010) * (CVE-2024-26960) * (CVE-2024-38596) * (CVE-2022-48743) * (CVE-2024-26733) * (CVE-2024-26586) * (CVE-2024-26698) * (CVE-2023-52619) Bug Fix(es): * Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678) * [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841) * [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941) * lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437) * [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074) * Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167) * blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939) * (JIRA:Rocky Linux-31798) * (JIRA:Rocky Linux-10263) * (JIRA:Rocky Linux-40901) * (JIRA:Rocky Linux-43547) * (JIRA:Rocky Linux-34876) Enhancement(s): * [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451) * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939) * kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622) * kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669) * kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802) * kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843) * kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878) * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653) * kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: ext4: fix corruption during on-line resize (CVE-2024-35807) * kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801) * kernel: dyndbg: fix old BUG_ON in &gt;control parser (CVE-2024-35947) * kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893) * kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876) * kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864) * kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845) * (CVE-2023-28746) * (CVE-2023-52847) * (CVE-2021-47548) * (CVE-2024-36921) * (CVE-2024-26921) * (CVE-2021-47579) * (CVE-2024-36927) * (CVE-2024-39276) * (CVE-2024-33621) * (CVE-2024-27010) * (CVE-2024-26960) * (CVE-2024-38596) * (CVE-2022-48743) * (CVE-2024-26733) * (CVE-2024-26586) * (CVE-2024-26698) * (CVE-2023-52619) Bug Fix(es): * Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678) * [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841) * [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941) * lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437) * [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074) * Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167) * blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939) * (JIRA:Rocky Linux-31798) * (JIRA:Rocky Linux-10263) * (JIRA:Rocky Linux-40901) * (JIRA:Rocky Linux-43547) * (JIRA:Rocky Linux-34876) Enhancement(s): * [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-553.16.1.el8_10.aarch64.rpm aa99ce956c0d1f1d2e85f7c7f9028c0aeecd70ef3cdd7227efa496349eab74e1 RLSA-2024:5079 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c (CVE-2018-15209) * libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c (CVE-2023-25433) * libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c (CVE-2023-6228) * libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c (CVE-2018-15209) * libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c (CVE-2023-25433) * libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c (CVE-2023-6228) * libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libtiff-tools-4.0.9-32.el8_10.aarch64.rpm 7db4d981e8df43a6af1e3d260b3999f62ad6918817cf28e707c169539b56691c RLSA-2024:5531 Important: python3.12-setuptools security update Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3.12-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3.12-setuptools-wheel-68.2.2-4.el8_10.noarch.rpm 9767ddf55bceb78f32a0855b666e5346b0de052fa44e44475a01f29505c929d6 RLSA-2024:6422 Important: bubblewrap and flatpak security update Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for flatpak, bubblewrap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms flatpak-devel-1.12.9-3.el8_10.aarch64.rpm 313728301804d54e772c691cc98c79e5191cbdf6fea0fa4812e93d69c08d11d3 RLSA-2024:5941 Moderate: libvpx security update The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Heap buffer overflow related to VP9 encoding (CVE-2023-6349) * libvpx: Integer overflow in vpx_img_alloc() (CVE-2024-5197) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libvpx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Heap buffer overflow related to VP9 encoding (CVE-2023-6349) * libvpx: Integer overflow in vpx_img_alloc() (CVE-2024-5197) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libvpx-devel-1.7.0-11.el8_10.aarch64.rpm 93055bb587a94fc05af0541459431fe3f825fa363217524f36e02e346273960c RLBA-2024:6981 libldb bug fix update The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Bug Fix(es): * libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Bug Fix(es): * libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109) rocky-linux-8-aarch64-powertools-rpms python3-ldb-devel-2.8.0-1.el8_10.aarch64.rpm 7c849060358162eb0d5eb4600ec92300edb75d28c967d69173f1219dd0b55fc3 python-ldb-devel-common-2.8.0-1.el8_10.aarch64.rpm 9a49c079e2555a1ba8d9bfcc14969de125c67a14a283b4400fd1f1e9ee78971e RLBA-2024:6983 libuser bug fix and enhancement update The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included. Bug Fix(es) and Enhancement(s): * [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111) * libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libuser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included. Bug Fix(es) and Enhancement(s): * [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111) * libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578) rocky-linux-8-aarch64-powertools-rpms libuser-devel-0.62-26.el8_10.aarch64.rpm bbb9c8dd000628d6ac7646691043a942fba369658ae69f4f1ca643fc5e4fcc4f RLSA-2024:6961 Moderate: python3.12 security update Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. For the unversioned "python" executable, see manual page "unversioned-python". Security Fix(es): * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3.12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. For the unversioned "python" executable, see manual page "unversioned-python". Security Fix(es): * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3.12-debug-3.12.5-2.el8_10.aarch64.rpm fb4447e833742ff246cc48f4401e6211a7c36223904f6f0bc174bb90b054a8f1 python3.12-idle-3.12.5-2.el8_10.aarch64.rpm ca3c50555b6055051385b5944f43054329e02f81b6ec051569952ed42d2fb3f0 python3.12-test-3.12.5-2.el8_10.aarch64.rpm 53383207fcaab298a7ade0ce287f5c299c6a382adfccb9d09bb7b083aa28876a RLSA-2024:6962 Moderate: python3.11 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) * python: cpython: From NVD collector (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3.11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) * python: cpython: From NVD collector (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3.11-debug-3.11.9-7.el8_10.aarch64.rpm 6b2da848351290a1e38a58b9d0ae705a0c7663fc3a0aae2ee6b7e433e5cf5f8f python3.11-idle-3.11.9-7.el8_10.aarch64.rpm f297f66f7a47e4a0f8965fa52be1521e615ca95afff81a83847390e70df9b5db python3.11-test-3.11.9-7.el8_10.aarch64.rpm c0bf7396f06484d27ef37d403d3f2af9fd7d61f36d395501be29081a3c7dd425 RLSA-2024:6963 Moderate: gtk3 security update The GTK+ library provides a multi-platform toolkit for creating graphical user interfaces. The gtk3 packages contain GTK+ version 3. Security Fix(es): * gtk3: gtk2: Library injection from CWD (CVE-2024-6655) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gtk3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GTK+ library provides a multi-platform toolkit for creating graphical user interfaces. The gtk3 packages contain GTK+ version 3. Security Fix(es): * gtk3: gtk2: Library injection from CWD (CVE-2024-6655) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms gtk3-devel-docs-3.22.30-12.el8_10.aarch64.rpm 2fd6e1189e358d40dc4ef0e8a89e4b1dde6ca3aa8944b80c579b6f7e890a500a RLBA-2024:6967 xmlsec1 bug fix update XML Security Library is a C library based on LibXML2 and OpenSSL. The library was created with a goal to support major XML security standards "XML Digital Signature" and "XML Encryption". Bug Fix(es): * xmlsec1: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-36185) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xmlsec1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML Security Library is a C library based on LibXML2 and OpenSSL. The library was created with a goal to support major XML security standards "XML Digital Signature" and "XML Encryption". Bug Fix(es): * xmlsec1: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-36185) rocky-linux-8-aarch64-powertools-rpms xmlsec1-devel-1.2.25-8.el8_10.aarch64.rpm 5fece1b1f9ef978785fd40f5495ae13b81ab0778f67b2fe5d2a0644f0cbd1114 xmlsec1-gcrypt-1.2.25-8.el8_10.aarch64.rpm 0a34c0839f9552e30679513e407582360ebb512363692424e5c34872bb2ba114 xmlsec1-gnutls-1.2.25-8.el8_10.aarch64.rpm 2f9eff48cb1df89b0be15e2e56a429abf52706a5ab1f885c32a1fc583665b6d4 xmlsec1-gnutls-devel-1.2.25-8.el8_10.aarch64.rpm 0f7eac954c517e82e1e17c289c615bb01e03bd6a949f6d6b1b3605c39738bc74 xmlsec1-openssl-devel-1.2.25-8.el8_10.aarch64.rpm 044982422455d995c05be63764af466e1d9a3be94aeda9c6fa2984d4dc246500 RLSA-2024:6973 Moderate: dovecot security update Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: using a large number of address headers may trigger a denial of service (CVE-2024-23184) * dovecot: very large headers can cause resource exhaustion when parsing message (CVE-2024-23185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dovecot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: using a large number of address headers may trigger a denial of service (CVE-2024-23184) * dovecot: very large headers can cause resource exhaustion when parsing message (CVE-2024-23185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dovecot-devel-2.3.16-6.el8_10.aarch64.rpm e1eb18cf5e7eed9c8dcc87658dfd6197053d9416befb716d40299a35c9ba9fdb RLSA-2024:7463 Important: cups-filters security update The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source () * cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076) * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cups-filters. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source () * cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076) * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms cups-filters-devel-1.20.0-35.el8_10.aarch64.rpm cdb4d46b3f8b50699d93bef3b3f30df24adb8dd15618be9b241ca731534bffaf RLSA-2024:7851 Important: .NET 6.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.135 and .NET Runtime 6.0.35. Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.135 and .NET Runtime 6.0.35. Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el8_10.aarch64.rpm 69c5e2d74d654e0252a1b9cd6e479ce1fcfb31b412bcb7f69c14c6418843d7b0 RLSA-2024:7868 Important: .NET 8.0 security update .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.110 and .NET Runtime 8.0.10. Security Fix(es): * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.110 and .NET Runtime 8.0.10. Security Fix(es): * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el8_10.aarch64.rpm a474ae50fb3f3bceabda9cf09bf40391936a7562f50c6039defb55efb55e1d10 RLSA-2024:8121 Moderate: java-11-openjdk security update The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el8.aarch64.rpm daadca041d04a677f589469305b55798d1a64119f98b5180b7b988066c54a7e9 java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el8.aarch64.rpm 41588e08bfeb4334bfff64a7deaccc3e43d107b92ddd0ca9d88673bd56f87e0a java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el8.aarch64.rpm 64264ab529f203781d94ccaae709402d40845c4731104f1df7923143508aef10 java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el8.aarch64.rpm 9421299b26ec7625f67efa2133762f984cd9f1b731196e0ae6ea49b876535a52 java-11-openjdk-fastdebug-11.0.25.0.9-2.el8.aarch64.rpm f595e726c9769be97feaec6b2483414d0dc833d6406daf77fb001119efe04a75 java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el8.aarch64.rpm 412810573a257952ab615f9b68194e1a0cbaaf4568d03fcca8ef00a5ebd9d343 java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el8.aarch64.rpm 246b463bfa8f7f95d00e1f94a918d845fb00da71f5dce92cdbb1bfeb0f068b80 java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el8.aarch64.rpm ed2fdcd024f88eaca50ec15c3f7184d91f9e762611fc88c884df5386ca6e85d7 java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el8.aarch64.rpm e09d59807551ab83582e0db812271a2df7033e493567ac1d58b5c25729dea451 java-11-openjdk-slowdebug-11.0.25.0.9-2.el8.aarch64.rpm 693d86c6aefb8941e6a64d764c9ae90b8efaf78789653b939874c64790dddd09 java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el8.aarch64.rpm ca95175b886abc635af532671e85038240ac231e0c927fb0dd9e04980f9b1fde java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el8.aarch64.rpm fbbeb9b0424328ea29e92a50f659e7d4463735ba7a2ee6328ee5d10ee84a40a2 java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el8.aarch64.rpm 43eab709c35f0204b7ac710422640ab17454041a4254e280eac6e2272997a580 java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el8.aarch64.rpm cc6345d4fc3aaa93a6424ab6d33da37680a0da40ae9fad5b87db61a9ba0dd2d6 RLSA-2024:8127 Moderate: java-21-openjdk security update The OpenJDK 21 runtime environment. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 runtime environment. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el8.aarch64.rpm 24363f9a5e53a31ad540fc280dfc00b7fdfc425eec985c62e2ba53f9fc8bcd0c java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el8.aarch64.rpm 6199a569a718eb0fbd3e4fbc86576b1085eb88571232b6bee2a8bd5d31806c10 java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el8.aarch64.rpm 593798ec9f931b542c74a377a2c35ca32e18d8dec547d81328b8fe252bc88986 java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el8.aarch64.rpm 0312734f2d026068f92988490ba5fb331fcfb915658cc4b15931269276e55554 java-21-openjdk-fastdebug-21.0.5.0.10-3.el8.aarch64.rpm d3141efa98175ab1d715a3486a0abdabb6b8acee1715f959b23567de73ee805d java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el8.aarch64.rpm d75406196307394cfe18b1ae5750690bc63a24b634112fd0dc777e164d85276a java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el8.aarch64.rpm 0421463bd6a365d8407b02c87a715b82c72c7eb1083235477e18419f2d6b3b32 java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el8.aarch64.rpm f2aa20e5731dd8016bceb6b2c91ee5cda0a149409ce8dce3ae4d4f4efc83ab2c java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el8.aarch64.rpm cc30c32537e36aadeec490b7337335fb22017d5c1b953865bd7ddabb7c696c8c java-21-openjdk-slowdebug-21.0.5.0.10-3.el8.aarch64.rpm a3259d399e496cc35f0f79b5c0e6c2364431be62081d1cb8474662c9acb8f9f7 java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el8.aarch64.rpm e2cd8a342ae7eebf90a130c1dece05b46e428e345e6f069f44bab5de08e110b1 java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el8.aarch64.rpm fed439fc937ee25c65b240e451b1d806bb398d5eecfea37b8db8e2af4281f8d3 java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el8.aarch64.rpm 6fd4dc28e3b23fea227dfb0e2c9d26d7dec3fedb845c1b26becc498369e7b9df java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el8.aarch64.rpm c8ba9118c8e2b3b6cd9662bf26315dfab9736ae8628e37f981a2ed845b20edb7 RLSA-2024:8124 Moderate: java-17-openjdk security update The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el8.aarch64.rpm 0e3c761061095d6297acd5847dd0e0c07a133f69f2512cdb426c36e697c64740 java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el8.aarch64.rpm 48ee0304abf6f514a3668cd596e205727ad3758fc84d9023707dc41a6233c81c java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el8.aarch64.rpm 87fd105ccef1ddde9c25da7312337ae5279afdf0c3f4032d4bead71647d3ac02 java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el8.aarch64.rpm da1b071f16dcccb5fcebb3cc61fc1ad84aaacaf2ece754ec5c9aead425c677c4 java-17-openjdk-fastdebug-17.0.13.0.11-3.el8.aarch64.rpm e847a7b6b6892bd3eb5c0f3d884dcefd66ce853edd70f7d2ff4e594f8697e60e java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el8.aarch64.rpm 32acb3268abdf45e599187dc4a9aa43249e08f8f4158b775ebd4243c760cd441 java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el8.aarch64.rpm 8dc9084cf53e4f586730acbb1e01ea15aa299a8f9c2486860d5b40fa3ae9c653 java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el8.aarch64.rpm 4b59559bfd0459faca54255898e60fbafb673239a8e03e8629937b9cb92c9783 java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el8.aarch64.rpm e8b45eca1b332f5eb6a0c6ac40e3043fb00506cfe084b353868fc541ed4feaae java-17-openjdk-slowdebug-17.0.13.0.11-3.el8.aarch64.rpm 9f5bf8f2326a20d291de5753007f6600896098d16bdc478b82d1810d23316d9e java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el8.aarch64.rpm 9a11c6f30508f51d8cb120404ff6d012027b571f60ca9ae34e90ca0e793523c9 java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el8.aarch64.rpm 22331fbd84a7eb77d0244e57c609d6c0132254b02953dbabe6202e58ef3d431f java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el8.aarch64.rpm b2fa8c0013e2cf55b28729e11b28b532934a47678593761d105b5ca22efba56d java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el8.aarch64.rpm db29d9281e3ff415be1cc6d6d0633b4b8b113f17926bb4deb28f20382babb3b2 RLSA-2024:8117 Moderate: java-1.8.0-openjdk security update The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8.aarch64.rpm 5948372c3541112d160a19ecb1e25a05897a12fb8c754f0a82f9155816a25b62 java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8.aarch64.rpm ae663e0580de1d297a2250cc26f3802a05526d2e078162627d2d7da8276254b4 java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el8.aarch64.rpm 142a1362a6241c2abe131ec8296984a8742c63aa0ab42063b0131ed399fcddb4 java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el8.aarch64.rpm 5e809b5335ffb26aae6c4a0914e9bd0e5706d89fead5db492db337b088b6191a java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el8.aarch64.rpm 33355661dd4745d20c62c06053885241a1fb5ec919e7011e198a92987cabf915 java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el8.aarch64.rpm a0e6ac46d209d28a7ed59bc020f0f57f9d6725d14642bb7bcf5137a91bf0408f java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el8.aarch64.rpm 52cb4b697a7b343284e04d6adf6ec8228eac2739eaa817afcbc7924391180af9 java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el8.aarch64.rpm 56afb10b724244ab896b6292c5ec4f1e716d521e7bb9271edb8d74ce35f62f76 java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el8.aarch64.rpm 9d92a03166d748a1296840a63af6194fe31f358be24f792c73cd6b7c6f4c092a java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el8.aarch64.rpm e4bb831cd02438c5124e59c67ab77f3c1ee51a4159d90ee33af67a08809d63d3 java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el8.aarch64.rpm 53cf6d072cc203354779077bc7c753e0014ce577c909976a265697e879d82957 java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el8.aarch64.rpm 18ccee919dbedf4b8e03584c84a2cb7488f23c3b1cef070ff277aca479fb05a5 RLEA-2024:8852 libproxy bug fix and enhancement update The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies. Bug Fix(es) and Enhancement(s): * libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies. Bug Fix(es) and Enhancement(s): * libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660) rocky-linux-8-aarch64-powertools-rpms libproxy-devel-0.4.15-5.5.el8_10.aarch64.rpm b1985b43314e84124e9f346c8316b4d513d5e2494f8c6dc147c226d37ac4f372 RLSA-2024:8856 Moderate: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857) * kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492) * kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851) * kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) * kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017) * kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976) * kernel: nouveau: lock the client object tree. (CVE-2024-27062) * kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839) * kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898) * kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939) * kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541) * kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540) * kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503) * kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924) * kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961) * kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983) * kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; (CVE-2024-40984) * kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773) * kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009) * kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042) * kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066) * kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092) * kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093) * kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880) * kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936) * kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889) * kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892) * kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935) * kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857) * kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492) * kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851) * kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) * kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017) * kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976) * kernel: nouveau: lock the client object tree. (CVE-2024-27062) * kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839) * kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898) * kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939) * kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541) * kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540) * kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503) * kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924) * kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961) * kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983) * kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; (CVE-2024-40984) * kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773) * kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009) * kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042) * kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066) * kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092) * kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093) * kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880) * kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936) * kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889) * kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892) * kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935) * kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms kernel-tools-libs-devel-4.18.0-553.27.1.el8_10.aarch64.rpm 7b6c3976622a0d8605a5c8659dad14e510a60c712f210ed735d8ba1c46b008e6 RLSA-2024:8859 Moderate: xmlrpc-c security update XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms xmlrpc-c-c++-1.51.0-10.el8_10.aarch64.rpm d1abcfa913e13a86565eb408d58474226761a8f2398916287c2555e952008eae xmlrpc-c-client++-1.51.0-10.el8_10.aarch64.rpm 97567f3755a1f4aed23748de0dee839c29093fb60de2663e3baa161446aa94e3 xmlrpc-c-devel-1.51.0-10.el8_10.aarch64.rpm 84276337f8eb89250d482639b4b72bbe5e520e66d29eeab4bd74315312c70f90 RLBA-2024:8861 openldap bug fix update OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Bug Fix(es): * LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Bug Fix(es): * LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538) rocky-linux-8-aarch64-powertools-rpms openldap-servers-2.4.46-20.el8_10.aarch64.rpm b8188797739308339ec3d400a6561ffdc3118d44cac3e6f35ca3030cb41b843e RLBA-2024:8866 glib2 bug fix update GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es): * Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es): * Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828) rocky-linux-8-aarch64-powertools-rpms glib2-doc-2.56.4-165.el8_10.noarch.rpm 493211e216fd6518e4a21186ecaf7ada2da794767fa9445a064735c70618f531 glib2-static-2.56.4-165.el8_10.aarch64.rpm ef345d15ca72f59c894b211597605a5a6dc4ca7cba2877f9aab1a0b3b57e358d RLSA-2024:8798 Moderate: xorg-x11-server and xorg-x11-server-Xwayland security update X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xorg-x11-server-Xwayland, xorg-x11-server. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms xorg-x11-server-devel-1.20.11-25.el8_10.aarch64.rpm 2c6435bc02c2679ca5ced231465741f6fa6832274046617f98cfd1fe2869a83a xorg-x11-server-source-1.20.11-25.el8_10.noarch.rpm ff868f94f0772f91372739b5b59d1efaabc72a84f7a4888dc34060f97374b924 RLSA-2024:8831 Low: bcc security update BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool. Security Fix(es): * bcc: unprivileged users can force loading of compromised linux headers (CVE-2024-2314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for bcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool. Security Fix(es): * bcc: unprivileged users can force loading of compromised linux headers (CVE-2024-2314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms bcc-devel-0.25.0-9.el8_10.aarch64.rpm 9eaaca3a0f3f5b02daaf5e2a4e5a4b6c4064fe64c221b970a5c7fa40f3fad3c1 bcc-doc-0.25.0-9.el8_10.noarch.rpm 8f025225175255db60efc9b0d7cd3aa2bb3099b77599bc2a0d3b447559479c60 RLSA-2024:8833 Moderate: libtiff security update The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: NULL pointer dereference in tif_dirinfo.c (CVE-2024-7006) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtiff. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: NULL pointer dereference in tif_dirinfo.c (CVE-2024-7006) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms libtiff-tools-4.0.9-33.el8_10.aarch64.rpm 5e40f78728db156951b3dbfd3a0f429629da9c545ce3f1eba4a4187d1cfd6329 RLEA-2024:8835 spirv-tools, vulkan-headers, vulkan-loader, vulkan-tools, and vulkan-validation-layers bug fix and enhancement update Vulkan validation layers Bug Fix(es) and Enhancement(s): * [8.10.z] Vulkan rebase (z-stream): glslang (JIRA:Rocky Linux-54282) * [8.10.z] Vulkan rebase (z-stream): spirv-headers (JIRA:Rocky Linux-54284) * [8.10.z] Vulkan rebase (z-stream): spirv-tools (JIRA:Rocky Linux-54285) * [8.10.z] Vulkan rebase (z-stream): vulkan-headers (JIRA:Rocky Linux-54286) * [8.10.z] Vulkan rebase (z-stream): vulkan-loader (JIRA:Rocky Linux-54287) * [8.10.z] Vulkan rebase (z-stream): vulkan-tools (JIRA:Rocky Linux-54288) * [8.10.z] Vulkan rebase (z-stream): vulkan-validation-layers (JIRA:Rocky Linux-54290) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vulkan-validation-layers, vulkan-headers, vulkan-tools, spirv-tools, vulkan-loader. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vulkan validation layers Bug Fix(es) and Enhancement(s): * [8.10.z] Vulkan rebase (z-stream): glslang (JIRA:Rocky Linux-54282) * [8.10.z] Vulkan rebase (z-stream): spirv-headers (JIRA:Rocky Linux-54284) * [8.10.z] Vulkan rebase (z-stream): spirv-tools (JIRA:Rocky Linux-54285) * [8.10.z] Vulkan rebase (z-stream): vulkan-headers (JIRA:Rocky Linux-54286) * [8.10.z] Vulkan rebase (z-stream): vulkan-loader (JIRA:Rocky Linux-54287) * [8.10.z] Vulkan rebase (z-stream): vulkan-tools (JIRA:Rocky Linux-54288) * [8.10.z] Vulkan rebase (z-stream): vulkan-validation-layers (JIRA:Rocky Linux-54290) rocky-linux-8-aarch64-powertools-rpms spirv-tools-devel-2024.2-1.el8_10.aarch64.rpm 797d088910da4ed36da676e607680ba05f646c607503d0de1dcf5244352d110f RLSA-2024:8836 Moderate: python3.12 security update Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. For the unversioned "python" executable, see manual page "unversioned-python". Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3.12. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. For the unversioned "python" executable, see manual page "unversioned-python". Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3.12-debug-3.12.6-1.el8_10.aarch64.rpm ff5dd496d7a25d0d1fd15f7f3cb1f83162ea7b31e96becc90f732ff964fcf214 python3.12-idle-3.12.6-1.el8_10.aarch64.rpm 7fb4e7d7d3fc3f12afb9817856889ace3cbe56c198bdc0f10aabf7b22d230866 python3.12-test-3.12.6-1.el8_10.aarch64.rpm 20affe5818b7153f9d27229a46408ddcf191466b368b137cbde7ac16071bc262 RLSA-2024:8838 Moderate: python3.11 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3.11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-powertools-rpms python3.11-debug-3.11.10-1.el8_10.aarch64.rpm ce61956c94fa731dca5dbbbf46c4e0de0ad02b674b4accfc7c750ec77cacacbf python3.11-idle-3.11.10-1.el8_10.aarch64.rpm fafbcc9590ec14c05f973cc9ed482cce4669be3934b54e018b608704f8d0bce1 python3.11-test-3.11.10-1.el8_10.aarch64.rpm ee7073b1d6d1f8b376d61abe0577fee65d7f867f6f9e925da66cd90558c712c7 RLBA-2024:8844 freerdp bug fix update FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Bug Fix(es): * Can't connect to Rocky Linux 10 installer (JIRA:Rocky Linux-53081) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freerdp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Bug Fix(es): * Can't connect to Rocky Linux 10 installer (JIRA:Rocky Linux-53081) rocky-linux-8-aarch64-powertools-rpms freerdp-devel-2.11.7-1.el8_10.aarch64.rpm 458e58d7e609ed12c74a1d7059d8e6ed4286fa47da1220856a3a211bd011a571 RLBA-2024:8845 ghostscript bug fix update The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Bug Fix(es): * Ghostscript is generating PJL of a significantly larger size (JIRA:Rocky Linux-61729) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ghostscript. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Bug Fix(es): * Ghostscript is generating PJL of a significantly larger size (JIRA:Rocky Linux-61729) rocky-linux-8-aarch64-powertools-rpms ghostscript-doc-9.27-15.el8_10.noarch.rpm b5fd1836d5ccb6a811fd8f87a3f99a68b5568950555befa5f8b065ae19a9c536 ghostscript-tools-dvipdf-9.27-15.el8_10.aarch64.rpm 4b4812bd4c716cb113d567d6d90b6c753cd94405974c980a9f57f765e5881e87 ghostscript-tools-fonts-9.27-15.el8_10.aarch64.rpm aae491e3bf48e1cf820b3af567cf144622ccf5d84e6b6343e1be170662894c1d ghostscript-tools-printing-9.27-15.el8_10.aarch64.rpm 4f2b35d61b40b6d05d66f6eaab1e1bb1182a423839286e026f284208f60904f4 libgs-devel-9.27-15.el8_10.aarch64.rpm c67f99b7ad52f8492cadee3e812f8a9cb38a54894833b9b1585e58adcf41fd9d RLEA-2024:9519 .NET 9.0 bug fix and enhancement update .NET is a fast, lightweight and modular platform for creating cross platform applications that work on Linux, macOS and Windows. It particularly focuses on creating console applications, web applications and micro-services. .NET contains a runtime conforming to .NET Standards a set of framework libraries, an SDK containing compilers and a 'dotnet' application to drive everything. Bug Fix(es): * Update to .NET 9 RC 1 (JIRA:Rocky Linux-59037) * Update to .NET 9 RC 2 (JIRA:Rocky Linux-62768) Enhancement(s): * New Package Request: dotnet9.0: .NET 9 for Rocky Linux 8 (JIRA:Rocky Linux-46701)Bug Fix(es) and Enhancement(s): * New Package Request: dotnet9.0: .NET 9 for Rocky Linux 8 (JIRA:Rocky Linux-46701) * Update to .NET 9 RC 1 (JIRA:Rocky Linux-59037) * Update to .NET 9 RC 2 (JIRA:Rocky Linux-62768) * Update .NET 9.0 to SDK 9.0.100 and Runtime 9.0.0 (JIRA:Rocky Linux-65536) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet9.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a fast, lightweight and modular platform for creating cross platform applications that work on Linux, macOS and Windows. It particularly focuses on creating console applications, web applications and micro-services. .NET contains a runtime conforming to .NET Standards a set of framework libraries, an SDK containing compilers and a 'dotnet' application to drive everything. Bug Fix(es): * Update to .NET 9 RC 1 (JIRA:Rocky Linux-59037) * Update to .NET 9 RC 2 (JIRA:Rocky Linux-62768) Enhancement(s): * New Package Request: dotnet9.0: .NET 9 for Rocky Linux 8 (JIRA:Rocky Linux-46701)Bug Fix(es) and Enhancement(s): * New Package Request: dotnet9.0: .NET 9 for Rocky Linux 8 (JIRA:Rocky Linux-46701) * Update to .NET 9 RC 1 (JIRA:Rocky Linux-59037) * Update to .NET 9 RC 2 (JIRA:Rocky Linux-62768) * Update .NET 9.0 to SDK 9.0.100 and Runtime 9.0.0 (JIRA:Rocky Linux-65536) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el8_10.aarch64.rpm daeb49bf53856af3294df87e1210c4a9142a9e6c53358dc346a941d9010a23ce RLBA-2024:9568 .NET 6.0 bug fix and enhancement update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 (Rocky Linux-65364)Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 (JIRA:Rocky Linux-65364) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet6.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 (Rocky Linux-65364)Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 (JIRA:Rocky Linux-65364) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-6.0-source-built-artifacts-6.0.136-1.el8_10.aarch64.rpm f3ad61c8c7cf8339a5a34d90bc8479cdff2215be6e3d7d6d429e50e6eaf24d97 RLBA-2024:9569 .NET 8.0 bug fix and enhancement update .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 8.0 to SDK 8.0.111 and Runtime 8.0.11 (Rocky Linux-65366)Bug Fix(es) and Enhancement(s): * Update .NET 8.0 to SDK 8.0.111 and Runtime 8.0.11 (JIRA:Rocky Linux-65366) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dotnet8.0. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 8.0 to SDK 8.0.111 and Runtime 8.0.11 (Rocky Linux-65366)Bug Fix(es) and Enhancement(s): * Update .NET 8.0 to SDK 8.0.111 and Runtime 8.0.11 (JIRA:Rocky Linux-65366) rocky-linux-8-aarch64-powertools-rpms dotnet-sdk-8.0-source-built-artifacts-8.0.111-1.el8_10.1.aarch64.rpm 5b26d4138495a653cbcd0d235db9ee99008a2928d5bfecf18d1663458a0d92d9 RLBA-2024:9685 evolution bug fix update Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. Bug Fix(es): * WebKitGTK 2.46.1: Middle mouse button inserts primary clipboard twice [rhel-8.10.z] (JIRA:Rocky Linux-62681) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for evolution. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. Bug Fix(es): * WebKitGTK 2.46.1: Middle mouse button inserts primary clipboard twice [rhel-8.10.z] (JIRA:Rocky Linux-62681) rocky-linux-8-aarch64-powertools-rpms evolution-devel-3.28.5-27.el8_10.aarch64.rpm 639f1d5c03d5b41241c73f244b0ee084feaee694a63d5fa6b6155c0f4b549ef6